A concept of standard-based vulnerability management automation for IT systems
Journal Title: Computer Science and Mathematical Modelling - Year 2016, Vol 0, Issue 3
Abstract
The paper focuses on the attempt to show a way of automating IT vulnerability management across enterprise systems with the use of the Security Content Automation Protocol. SCAP offers a set of components which provide, among others, adjustable security checklists, standardised dictionaries of security vulnerabilities and vulnerability scoring methods that may prove valuable for organisations in terms of security analysis activities and quantitative risk assessment.
Authors and Affiliations
Rafał Kasprzyk, Artur Stachurski
Hidden Markov Models as a text mining method
In the text mining applications probabilistic models of document are widely used. In this paper the Hidden Markov Models were described as a fundamental method for text processing. Definition of the HMM was presented and...
Comparison Between Experimental, Analytical and Simulation Model of Distributed Computation on ARM processors in High-Performance Computing
The paper presents a comparison between experimental, analytical and simulation model of distributed cryptographic computation regarding password recovery with SHA 1 password hashing. The aim of this paper is compare pop...
An AHP method to ERP system selection
An enterprise resource planning (ERP) is an enterprise-wide application software package that integrates all necessary business functions into a single system with a common database. In order to implement an ERP project...
Use case driven scheduling method of information technology project
In this article, requirements-oriented project scheduling method is presented. The method is use-case-oriented and shows how to prioritize use cases and schedule realization of information system. The method can be usefu...
Mathematical aspects of objects' spiderweb modelling
In this paper opportunities to use so called spiderweb modeling method in modeling and qualitative analysis of complex objects in the processes of data exploration were discussed. Such terms as N-dimension spiderweb s...