{"title":"脆弱性管理","authors":"Park Foreman","doi":"10.1002/9781119552963.ch4","DOIUrl":null,"url":null,"abstract":"Vulnerability management is the detailed, cyclical process of identifying and remediating weaknesses in an information technology system. It includes skills, processes, standards, and technologies combined to appropriately address the most relevant vulnerabilities in the target environment. While many standards and technologies exist, their selection and application are unique to the organization and threat environment.","PeriodicalId":278277,"journal":{"name":"Cybersecurity Blue Team Toolkit","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Vulnerability Management\",\"authors\":\"Park Foreman\",\"doi\":\"10.1002/9781119552963.ch4\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Vulnerability management is the detailed, cyclical process of identifying and remediating weaknesses in an information technology system. It includes skills, processes, standards, and technologies combined to appropriately address the most relevant vulnerabilities in the target environment. While many standards and technologies exist, their selection and application are unique to the organization and threat environment.\",\"PeriodicalId\":278277,\"journal\":{\"name\":\"Cybersecurity Blue Team Toolkit\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-04-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cybersecurity Blue Team Toolkit\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/9781119552963.ch4\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity Blue Team Toolkit","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/9781119552963.ch4","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Vulnerability management is the detailed, cyclical process of identifying and remediating weaknesses in an information technology system. It includes skills, processes, standards, and technologies combined to appropriately address the most relevant vulnerabilities in the target environment. While many standards and technologies exist, their selection and application are unique to the organization and threat environment.