|
advertisement |
|
|
|
|
|
|
Industrial Automatic Control Systems and Controllers Annotation << Back
Actions for Creating Database of Vulnerabilities for Ensuring Operational Neutralization of Threats |
I.S. Tulinov, Yu.A. Gubskov, Yu.Yu. Gromov, V.V. Shatskih
The work analyzes all public databases of vulnerabilities. Identifi ed their inherent shortcomings. An approach to the formation of a database of vulnerabilities without any shortcomings is proposed. Based on the analysis and the proposed approach to the creation of vulnerability databases based on the integration of public vulnerability databases. The ways of using an adequate database of vulnerabilities are considered, in order to provide operational resistance to vulnerability violations.
Keywords: information security; vulnerability; CVE; database; defence of data; threats.
Contacts: E-mail: gromovtambov@yandex.ru
Pp. 26-30. |
|
|
|
Last news:
Выставки по автоматизации и электронике «ПТА-Урал 2018» и «Электроника-Урал 2018» состоятся в Екатеринбурге Открыта электронная регистрация на выставку Дефектоскопия / NDT St. Petersburg Открыта регистрация на 9-ю Международную научно-практическую конференцию «Строительство и ремонт скважин — 2018» ExpoElectronica и ElectronTechExpo 2018: рост площади экспозиции на 19% и новые формы контент-программы Тематика и состав экспозиции РЭП на выставке "ChipEXPO - 2018" |