Addressing Internet Security Vulnerabilities
暂无分享,去创建一个
The exploitation of vulnerabilities in operating systems and applications has become a frequent and increasing problem in IT environments. This paper assesses the extent of the problem by examining the scale of vulnerability reports issued by a number of popular advisory sources. It then proceeds to determine the workload implications that this introduces from system administrators, benchmarking the number of vulnerabilities that would need to be addressed and patched within a reference environment over a 12-month period. It is concluded that further advances are required in order to facilitate more targeted vulnerability notification, and where possible, the automated rectification of the problems themselves.
[1] Steven Furnell,et al. Security analysers: administrator assistants or hacker helpers? , 2001, Inf. Manag. Comput. Secur..
[2] Katie Hafner,et al. Cyberpunk: Outlaws and Hackers on the Computer Frontier , 1991 .
[3] R. Power. CSI/FBI computer crime and security survey , 2001 .
[4] William A. Arbaugh,et al. IEEE 52 Computer , 1985 .