000 03868cam a2200577 i 4500
001 rnd000000000071852
003 RAND
005 20160615135114.0
008 031125s2003 caua b 000 0 eng d
010 _a 2003012342
020 _a0833034340 (pbk.)
020 _a0833035991 (electronic bk.)
020 _a9780833034342
020 _a9780833035998 (electronic bk.)
027 _aRAND/MR-1601-DARPA
035 _a(Sirsi) a441334
037 _c$24.00
_fpaperback
040 _aCstmoR
_cCstmoR
043 _an-us---
049 _aAlfaisal Main Library
050 0 0 _aQA76.9.A25
_bF525 2003
245 0 0 _aFinding and fixing vulnerabilities in information systems :
_bthe vulnerability assessment and mitigation methodology /
_cPhilip S. Anton ... [et al.].
264 1 _aSanta Monica, CA :
_bRAND,
_c2003.
300 _axxvi, 117 pages :
_billustrations ;
_c28 cm
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
337 _aunmediated
_bn
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
338 _avolume
_bnc
_2rdacarrier
500 _a"National Defense Research Institute."
504 _aIncludes bibliographical references (p.115-117).
505 0 _aIntroduction -- Concepts and Definitions -- VAM Methodology and Other DoD Practices in Risk Assessment -- Vulnerability Attributes of System Objects -- Direct and Indirect Security Techniques -- Generating Security Options for Vulnerabilities -- Automating and Executing the Methodology: A Spreadsheet Tool -- Next Steps and Discussion -- Summary and Conclusions -- Appendix: Vulnerability to Mitigation Map Values.
520 _aUnderstanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors, understanding the risks posed by new kinds of information security threats, build on previous RAND mitigation techniques by introducing the Vulnerability Assessment and Mitigation (VAM) methodology. The six-step procedure uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses. The authors lead evaluators through the procedure of classifying vulnerabilities in their systems' physical, cyber, human/social, and infrastructure elements, and identifying which security techniques can be relevant for these vulnerabilities. The authors also use VAM to break down information compromises into five fundamental components of attack or failure: knowledge, access, target vulnerability, non-retribution, and assessment. In addition, a new automated tool implemented as an Excel spreadsheet is discussed; this tool greatly simplifies using the methodology and emphasizes analysis on cautions, risks, and barriers.
530 _aAlso available on the internet via WWW in PDF format.
650 0 _aCommand and control systems
_xSecurity measures
_zUnited States.
650 0 _aComputer networks
_xSecurity measures
_zUnited States.
650 0 _aInformation services
_xSecurity measures
_zUnited States.
650 0 _aInformation superhighway
_xSecurity measures
_zUnited States.
650 0 _aInformation warfare
_zUnited States.
650 0 _aNational security
_zUnited States.
650 0 _aRisk assessment.
651 0 _aUnited States
_xDefenses.
655 7 _aElectronic books.
_2local
700 1 _aAntón, Philip S.
_eauthor.
700 1 _aAnderson, Robert H.
_q(Robert Helms),
_d1939-
_eauthor.
700 1 _aMesic, Richard,
_d1943-
_eauthor.
700 1 _aScheiern, Michael L.
_eauthor.
710 _aRand eBooks.
856 4 0 _uhttp://ezproxy.alfaisal.edu/login?url=http://www.rand.org/publications/MR/MR1601/
942 _2lcc
_cEBOOKS
999 _c300488
_d300488