{"title":"Automation of information security vulnerability management processes","authors":"V. V. Samko","doi":"10.31673/2409-7292.2022.040008","DOIUrl":null,"url":null,"abstract":"The article discusses an example of automation of IS vulnerability and risk management processes. The main requirements for the automation system and its tasks are defined. The most popular methods of risk management were considered and the impact of automation tools on management methods was checked. The possibilities of the proposed automation toolkit were considered, and recommendations were offered regarding its implementation and use.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"199 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2022.040008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The article discusses an example of automation of IS vulnerability and risk management processes. The main requirements for the automation system and its tasks are defined. The most popular methods of risk management were considered and the impact of automation tools on management methods was checked. The possibilities of the proposed automation toolkit were considered, and recommendations were offered regarding its implementation and use.