论文部分内容阅读
在启用漏洞管理程序后不久,企业往往会发现自己面临着海量的网络安全漏洞数据。扫描这些结果可能让企业看到分布在各种不同的系统和应用中的数百甚至数干个漏洞。安全专业人员应该如何解决这个风险问题?在本文中,我们将研究一种三角叉式优先级方案,其中整合了外部关键性评估、数据敏感度和现有控制环境来帮助企业成功地对漏洞进行评级,同时优化整治工作。这种三步骤过程是假定你已经获取了关于环境中存在的
Not long after enabling Vulnerability Management, enterprises often find themselves facing massive amounts of cybersecurity vulnerability data. Scanning these results may expose businesses to hundreds or even thousands of vulnerabilities distributed across a variety of different systems and applications. How can security professionals solve this risk problem? In this article, we examine a triangular fork priority solution that integrates external criticality assessments, data sensitivity, and existing control environments to help organizations successfully exploit vulnerabilities Rating, while optimizing the rectification work. This three-step process assumes that you have acquired information about the environment