{"title":"The role of vulnerability in risk management","authors":"K. Otwell, B. Aldridge","doi":"10.1109/CSAC.1989.81022","DOIUrl":null,"url":null,"abstract":"The treatment of vulnerability at the 1988 Risk Model Builders' Workshop is examined, and a definition of vulnerability that is intuitively satisfying and provides a foundation upon which mathematical models can be built is developed. Two vulnerability models that together appear to capture the general conceptualizations of vulnerability espoused by other authors are presented. The authors also discuss the ongoing development of their expert system for risk management (M/sup 2/RISK), which will utilize knowledge about vulnerabilities of information systems and their components. M/sup 2/RISK is designed to eventually function as a full risk-management system with interface tools that will allow rapid specification of systems and easy management of system changes, and generally aid the risk-management process.<<ETX>>","PeriodicalId":284420,"journal":{"name":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","volume":"65 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1989.81022","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
The treatment of vulnerability at the 1988 Risk Model Builders' Workshop is examined, and a definition of vulnerability that is intuitively satisfying and provides a foundation upon which mathematical models can be built is developed. Two vulnerability models that together appear to capture the general conceptualizations of vulnerability espoused by other authors are presented. The authors also discuss the ongoing development of their expert system for risk management (M/sup 2/RISK), which will utilize knowledge about vulnerabilities of information systems and their components. M/sup 2/RISK is designed to eventually function as a full risk-management system with interface tools that will allow rapid specification of systems and easy management of system changes, and generally aid the risk-management process.<>