翻訳と辞書
Words near each other
・ Vullithota
・ Vullnet Basha
・ Vully-les-Lacs
・ Vulmara
・ Vulmont
・ Vulnerability
・ Vulnerability (computing)
・ Vulnerability and Risk Committee
・ Vulnerability and susceptibility in conservation biology
・ Vulnerability and the Human Condition Initiative
・ Vulnerability assessment
・ Vulnerability database
・ Vulnerability Discovery Model
・ Vulnerability index
・ Vulnerability index (disambiguation)
Vulnerability management
・ Vulnerability of nuclear plants to attack
・ Vulnerability scanner
・ Vulnerable
・ Vulnerable (Marvin Gaye album)
・ Vulnerable (song)
・ Vulnerable (The Used album)
・ Vulnerable (Tricky album)
・ Vulnerable adult
・ Vulnerable Native Breeds
・ Vulnerable plaque
・ Vulnerable species
・ Vulnerable Veterans Housing Reform Act of 2013
・ Vulnet Emini
・ Vulnetari


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Vulnerability management : ウィキペディア英語版
Vulnerability management

Vulnerability management is the "cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities",〔Foreman, P: ''Vulnerability Management'', page 1. Taylor & Francis Group, 2010. ISBN 978-1-4398-0150-5〕 especially in software and firmware. Vulnerability management is integral to computer security and network security.
Vulnerabilities can be discovered with a vulnerability scanner, which analyzes a computer system in search of known vulnerabilities,〔Anna-Maija Juuso and Ari Takanen ''Unknown Vulnerability Management'', Codenomicon whitepaper, October 2010 ().〕 such as open ports, insecure software configuration, and susceptibility to malware. Unknown vulnerabilities, such as a zero-day attack〔 may be found with fuzz testing, which can identify certain kinds of vulnerabilities, such as a buffer overflow exploit with relevant test cases. Such analysis can be facilitated by test automation. In addition, antivirus software capable of heuristic analysis may discover undocumented malware if it finds software behaving suspiciously (such as attempting to overwrite a system file).
Correcting vulnerabilities may variously involve the installation of a patch, a change in network security policy, reconfiguration of software (such as a firewall), or educating users about social engineering.
== See also ==

*Application security
*Full disclosure
*Long-term support
*IT risk
*Risk management

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Vulnerability management」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.