@article{ART001976004},
author={SeongYoon Shin and Hyun Chang LEE},
title={A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step},
journal={Journal of The Korea Society of Computer and Information},
issn={1598-849X},
year={2015},
volume={20},
number={3},
pages={75-80}
TY - JOUR
AU - SeongYoon Shin
AU - Hyun Chang LEE
TI - A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step
JO - Journal of The Korea Society of Computer and Information
PY - 2015
VL - 20
IS - 3
PB - The Korean Society Of Computer And Information
SP - 75
EP - 80
SN - 1598-849X
AB - Vulnerability management is in compliance with security policies, and then, this is to ensure thecontinuity and availability of the business . In this paper, the application vulnerability management and ITinfrastructure of the system is that it must be identified. And a viable vulnerability management plan shouldbe drawn from the development phase. There are many that are not defined vulnerability in the area ofidentification and authentication, encryption, access control in identification and classification ofvulnerabilities. They define the area without missing much in technical, managerial, and operational pointof view. Determining whether the response of the identified vulnerability, and to select a countermeasurefor eliminating the vulnerability.
KW - Vulnerability Management;Identification and Authentication;Encryption
DO -
UR -
ER -
SeongYoon Shin and Hyun Chang LEE. (2015). A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step. Journal of The Korea Society of Computer and Information, 20(3), 75-80.
SeongYoon Shin and Hyun Chang LEE. 2015, "A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step", Journal of The Korea Society of Computer and Information, vol.20, no.3 pp.75-80.
SeongYoon Shin, Hyun Chang LEE "A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step" Journal of The Korea Society of Computer and Information 20.3 pp.75-80 (2015) : 75.
SeongYoon Shin, Hyun Chang LEE. A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step. 2015; 20(3), 75-80.
SeongYoon Shin and Hyun Chang LEE. "A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step" Journal of The Korea Society of Computer and Information 20, no.3 (2015) : 75-80.
SeongYoon Shin; Hyun Chang LEE. A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step. Journal of The Korea Society of Computer and Information, 20(3), 75-80.
SeongYoon Shin; Hyun Chang LEE. A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step. Journal of The Korea Society of Computer and Information. 2015; 20(3) 75-80.
SeongYoon Shin, Hyun Chang LEE. A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step. 2015; 20(3), 75-80.
SeongYoon Shin and Hyun Chang LEE. "A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step" Journal of The Korea Society of Computer and Information 20, no.3 (2015) : 75-80.