-
1
-
-
0012705741
-
-
SPC-2001054-CMC, Software Productivity Consortium, Herndon, Va., Jan.
-
B. Brykczynski and B. Small, Establishing and Measuring Information Security Policy Conformance, SPC-2001054-CMC, Software Productivity Consortium, Herndon, Va., Jan. 2002; www.software.org/catalog/products/product.asp?pfid=385.
-
(2002)
Establishing and Measuring Information Security Policy Conformance
-
-
Brykczynski, B.1
Small, B.2
-
2
-
-
0012704622
-
-
SPC-2002015-CMC, Software Productivity Consortium, Herndon, Va., June
-
B. Brykczynski and B. Small, Improving the Security Patch Management Process, SPC-2002015-CMC, Software Productivity Consortium, Herndon, Va., June 2002; www.software.org/catalog/products/product.asp?pfid=410.
-
(2002)
Improving the Security Patch Management Process
-
-
Brykczynski, B.1
Small, B.2
-
3
-
-
0242351531
-
-
President's Critical Infrastructure Protection Board, Washington, D.C., Sept.
-
The National Strategy to Secure Cyberspace (draft), President's Critical Infrastructure Protection Board, Washington, D.C., Sept. 2002; www.whitehouse.gov/pcipb.
-
(2002)
The National Strategy to Secure Cyberspace (Draft)
-
-
-
4
-
-
0012658028
-
Gartner: Most IT Security Problems Self-Inflicted
-
9 Oct.
-
J.C. Perez, "Gartner: Most IT Security Problems Self-Inflicted," Computerworld, 9 Oct. 2001. www.computerworld.com/securitytopics/security/story/0,10801,64605,00.html.
-
(2001)
Computerworld
-
-
Perez, J.C.1
-
5
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
Dec.
-
W. Arbaugh, W. Fithen, and J. McHugh, "Windows of Vulnerability: A Case Study Analysis," Computer, vol. 33, no. 12, Dec. 2000, pp. 52-59.
-
(2000)
Computer
, vol.33
, Issue.12
, pp. 52-59
-
-
Arbaugh, W.1
Fithen, W.2
McHugh, J.3
-
6
-
-
0012646518
-
-
CERT Coordination Center, Software Eng. Inst., Carnegie Mellon Univ., Pittsburgh
-
Keep Operating Systems and Applications Software Up to Date, CERT Coordination Center, Software Eng. Inst., Carnegie Mellon Univ., Pittsburgh, 2001, www.cert.org/security-improvement/practices/p067.html.
-
(2001)
Keep Operating Systems and Applications Software Up to Date
-
-
-
7
-
-
0012169314
-
CERT/CC Statistics 1988-2002
-
CERT Coordination Center, Software Eng. Inst., Carnegie Mellon Univ., Pittsburgh
-
"CERT/CC Statistics 1988-2002," CERT Coordination Center, Software Eng. Inst., Carnegie Mellon Univ., Pittsburgh, 2002, www.cert.org/stats/#vulnerabilities.
-
(2002)
-
-
-
8
-
-
4244145742
-
Closing the window of exposure
-
Counterpane Internet Security, Cupertino, Calif.
-
B. Schneier, "Closing the Window of Exposure," Counterpane Internet Security, Cupertino, Calif., 2002, www.counterpane.com/window.html.
-
(2002)
-
-
Schneier, B.1
-
9
-
-
12144276864
-
Timing the application of security patches for optimal uptime
-
S. Beattie et. al., "Timing the Application of Security Patches for Optimal Uptime," Proc. 16th Ann. USENIX Systems Administration Conf. (LISA 02), USENIX Assoc., Berkeley, Calif., 2002; www.nxnw.org/~steve/papers/lisa2002-time-to-patch.pdf.
-
Proc. 16th Ann. USENIX Systems Administration Conf. (LISA 02), USENIX Assoc., Berkeley, Calif., 2002
-
-
Beattie, S.1
-
10
-
-
0003692134
-
-
ISO/IEC 17799:2000, Int'l Organization for Standardization, Geneva, Dec.
-
Code of Practice for Information Security Management, ISO/IEC 17799:2000, Int'l Organization for Standardization, Geneva, Dec. 2000.
-
(2000)
Code of Practice for Information Security Management
-
-
-
11
-
-
12344276061
-
-
NIST Special Publication 800-40, Nat'l Inst. of Standards and Technology, Gaithersburg, Md., Aug.
-
P. Mell and M. Tracy, Procedures for Handling Security Patches-Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-40, Nat'l Inst. of Standards and Technology, Gaithersburg, Md., Aug. 2002.
-
(2002)
Procedures for Handling Security Patches-Recommendations of the National Institute of Standards and Technology
-
-
Mell, P.1
Tracy, M.2
-
12
-
-
0012646871
-
GSA to keep vigilant with patch-notification service
-
2 Dec.
-
E. Messmer, "GSA to Keep Vigilant with Patch-Notification Service," Network World, 2 Dec. 2002, www.nwfusion.com/news/2002/1202fedcirc.html.
-
(2002)
Network World
-
-
Messmer, E.1
-
13
-
-
0012647524
-
Feeling vulnerable?
-
Feb.
-
A. Berg, "Feeling Vulnerable?" Information Security, Feb. 2002, pp. 42-52; www.infosecuritymag.com/2002/feb/features_vulnerable.shtml.
-
(2002)
Information Security
, pp. 42-52
-
-
Berg, A.1
-
14
-
-
0012692777
-
Patching across the enterprise
-
Feb.
-
S. Sidel and A. Briney, "Patching across the Enterprise," Information Security, Feb. 2002, pp. 48-49; www.infosecuritymag.com/2002/feb/features_sidebar1.shtml.
-
(2002)
Information Security
, pp. 48-49
-
-
Sidel, S.1
Briney, A.2
-
15
-
-
0035499176
-
Managing vulnerabilities in networked systems
-
Nov.
-
R. Martin, "Managing Vulnerabilities in Networked Systems," Computer, vol. 34, no. 11, Nov. 2001, pp. 32-38.
-
(2001)
Computer
, vol.34
, Issue.11
, pp. 32-38
-
-
Martin, R.1
|