본문 바로가기
  • Home

A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step

  • Journal of The Korea Society of Computer and Information
  • Abbr : JKSCI
  • 2015, 20(3), pp.75-80
  • Publisher : The Korean Society Of Computer And Information
  • Research Area : Engineering > Computer Science

SeongYoon Shin ORD ID 1 Hyun Chang LEE 2

1군산대학교
2원광대학교

Accredited

ABSTRACT

Vulnerability management is in compliance with security policies, and then, this is to ensure thecontinuity and availability of the business . In this paper, the application vulnerability management and ITinfrastructure of the system is that it must be identified. And a viable vulnerability management plan shouldbe drawn from the development phase. There are many that are not defined vulnerability in the area ofidentification and authentication, encryption, access control in identification and classification ofvulnerabilities. They define the area without missing much in technical, managerial, and operational pointof view. Determining whether the response of the identified vulnerability, and to select a countermeasurefor eliminating the vulnerability.

Citation status

* References for papers published after 2023 are currently being built.