Efficient Vulnerability Management Process in the Military

Seung-hyun Baek, Young-Gab Kim
{"title":"Efficient Vulnerability Management Process in the Military","authors":"Seung-hyun Baek, Young-Gab Kim","doi":"10.1109/PLATCON.2019.8669420","DOIUrl":null,"url":null,"abstract":"Reducing vulnerabilities is one of the most effective ways to minimize the cyber risks that can occur to information systems. Given the characteristics of the military environment, particularly in operating a wide variety of information systems and dealing with critical information on national security, clear / concise management procedures are needed that enable more realistic and direct action to identify and address vulnerabilities. Also, five requirements for the efficient vulnerability management procedure in the military are proposed as follows: (i) quickness, (ii) continuousness, (iii) clearness, (iv) interdependence, and (v) completeness. By considering all information, this paper suggested 5 phases for the vulnerability management process in military: (i) Framing; (ii) Identification; (iii) Assessment; (iv) Remediation; and (v) Verification. In addition, the three-tiered concept was applied to the efficient management of the vulnerabilities, taking into consideration the characteristics of the organization with clear hierarchical relationships. As a result, it will contribute to reduce the cyber risk in the defense area, by presenting the specific procedures for vulnerability management in each hierarchical organization.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Platform Technology and Service (PlatCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PLATCON.2019.8669420","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Reducing vulnerabilities is one of the most effective ways to minimize the cyber risks that can occur to information systems. Given the characteristics of the military environment, particularly in operating a wide variety of information systems and dealing with critical information on national security, clear / concise management procedures are needed that enable more realistic and direct action to identify and address vulnerabilities. Also, five requirements for the efficient vulnerability management procedure in the military are proposed as follows: (i) quickness, (ii) continuousness, (iii) clearness, (iv) interdependence, and (v) completeness. By considering all information, this paper suggested 5 phases for the vulnerability management process in military: (i) Framing; (ii) Identification; (iii) Assessment; (iv) Remediation; and (v) Verification. In addition, the three-tiered concept was applied to the efficient management of the vulnerabilities, taking into consideration the characteristics of the organization with clear hierarchical relationships. As a result, it will contribute to reduce the cyber risk in the defense area, by presenting the specific procedures for vulnerability management in each hierarchical organization.
军队中有效的漏洞管理过程
减少漏洞是最大限度地减少信息系统可能发生的网络风险的最有效方法之一。鉴于军事环境的特点,特别是在操作各种各样的信息系统和处理关于国家安全的关键信息方面的特点,需要明确/简明的管理程序,以便能够采取更现实和直接的行动来查明和处理弱点。此外,还提出了军事中有效的脆弱性管理程序的五项要求如下:(i)快速性,(ii)连续性,(iii)明确性,(iv)相互依赖性和(v)完整性。在综合考虑所有信息的基础上,本文提出了军事脆弱性管理过程的5个阶段:(i)框架;(2)识别;(3)评估;(四)补救;核查。此外,考虑到组织层级关系清晰的特点,将三层概念应用于漏洞的高效管理。因此,通过展示每个层级组织中漏洞管理的具体程序,将有助于降低防御领域的网络风险。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信