메뉴 건너뛰기




Volumn 20, Issue 1, 2003, Pages 50-57

Reducing internet-based intrusions: Effective security patch management

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; INFORMATION TECHNOLOGY; SECURITY OF DATA; STANDARDS;

EID: 0037244529     PISSN: 07407459     EISSN: None     Source Type: Journal    
DOI: 10.1109/MS.2003.1159029     Document Type: Article
Times cited : (30)

References (18)
  • 2
    • 0012704622 scopus 로고    scopus 로고
    • SPC-2002015-CMC, Software Productivity Consortium, Herndon, Va., June
    • B. Brykczynski and B. Small, Improving the Security Patch Management Process, SPC-2002015-CMC, Software Productivity Consortium, Herndon, Va., June 2002; www.software.org/catalog/products/product.asp?pfid=410.
    • (2002) Improving the Security Patch Management Process
    • Brykczynski, B.1    Small, B.2
  • 3
    • 0242351531 scopus 로고    scopus 로고
    • President's Critical Infrastructure Protection Board, Washington, D.C., Sept.
    • The National Strategy to Secure Cyberspace (draft), President's Critical Infrastructure Protection Board, Washington, D.C., Sept. 2002; www.whitehouse.gov/pcipb.
    • (2002) The National Strategy to Secure Cyberspace (Draft)
  • 4
    • 0012658028 scopus 로고    scopus 로고
    • Gartner: Most IT Security Problems Self-Inflicted
    • 9 Oct.
    • J.C. Perez, "Gartner: Most IT Security Problems Self-Inflicted," Computerworld, 9 Oct. 2001. www.computerworld.com/securitytopics/security/story/0,10801,64605,00.html.
    • (2001) Computerworld
    • Perez, J.C.1
  • 5
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • Dec.
    • W. Arbaugh, W. Fithen, and J. McHugh, "Windows of Vulnerability: A Case Study Analysis," Computer, vol. 33, no. 12, Dec. 2000, pp. 52-59.
    • (2000) Computer , vol.33 , Issue.12 , pp. 52-59
    • Arbaugh, W.1    Fithen, W.2    McHugh, J.3
  • 6
    • 0012646518 scopus 로고    scopus 로고
    • CERT Coordination Center, Software Eng. Inst., Carnegie Mellon Univ., Pittsburgh
    • Keep Operating Systems and Applications Software Up to Date, CERT Coordination Center, Software Eng. Inst., Carnegie Mellon Univ., Pittsburgh, 2001, www.cert.org/security-improvement/practices/p067.html.
    • (2001) Keep Operating Systems and Applications Software Up to Date
  • 7
    • 0012169314 scopus 로고    scopus 로고
    • CERT/CC Statistics 1988-2002
    • CERT Coordination Center, Software Eng. Inst., Carnegie Mellon Univ., Pittsburgh
    • "CERT/CC Statistics 1988-2002," CERT Coordination Center, Software Eng. Inst., Carnegie Mellon Univ., Pittsburgh, 2002, www.cert.org/stats/#vulnerabilities.
    • (2002)
  • 8
    • 4244145742 scopus 로고    scopus 로고
    • Closing the window of exposure
    • Counterpane Internet Security, Cupertino, Calif.
    • B. Schneier, "Closing the Window of Exposure," Counterpane Internet Security, Cupertino, Calif., 2002, www.counterpane.com/window.html.
    • (2002)
    • Schneier, B.1
  • 10
    • 0003692134 scopus 로고    scopus 로고
    • ISO/IEC 17799:2000, Int'l Organization for Standardization, Geneva, Dec.
    • Code of Practice for Information Security Management, ISO/IEC 17799:2000, Int'l Organization for Standardization, Geneva, Dec. 2000.
    • (2000) Code of Practice for Information Security Management
  • 12
    • 0012646871 scopus 로고    scopus 로고
    • GSA to keep vigilant with patch-notification service
    • 2 Dec.
    • E. Messmer, "GSA to Keep Vigilant with Patch-Notification Service," Network World, 2 Dec. 2002, www.nwfusion.com/news/2002/1202fedcirc.html.
    • (2002) Network World
    • Messmer, E.1
  • 13
    • 0012647524 scopus 로고    scopus 로고
    • Feeling vulnerable?
    • Feb.
    • A. Berg, "Feeling Vulnerable?" Information Security, Feb. 2002, pp. 42-52; www.infosecuritymag.com/2002/feb/features_vulnerable.shtml.
    • (2002) Information Security , pp. 42-52
    • Berg, A.1
  • 14
    • 0012692777 scopus 로고    scopus 로고
    • Patching across the enterprise
    • Feb.
    • S. Sidel and A. Briney, "Patching across the Enterprise," Information Security, Feb. 2002, pp. 48-49; www.infosecuritymag.com/2002/feb/features_sidebar1.shtml.
    • (2002) Information Security , pp. 48-49
    • Sidel, S.1    Briney, A.2
  • 15
    • 0035499176 scopus 로고    scopus 로고
    • Managing vulnerabilities in networked systems
    • Nov.
    • R. Martin, "Managing Vulnerabilities in Networked Systems," Computer, vol. 34, no. 11, Nov. 2001, pp. 32-38.
    • (2001) Computer , vol.34 , Issue.11 , pp. 32-38
    • Martin, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.