Issue No. 06 - November/December (2007 vol. 9)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MITP.2007.105
Simon Liu , National Institutes of Health
Larry Holt , National Institutes of Health
Bruce Cheng , National Institutes of Health
Firewalls, malicious-code-screening servers, and intrusion-detection systems aren't sufficiently comprehensive to ensure appropriate and ongoing information confidentiality, integrity, and availability. A practical vulnerability assessment program lets organizations identify potential security exposures and correct any deficiencies.
Security, vulnerability assessment, intrusion detection, firewalls, malicious code screening, and information confidentiality, integrity, and availability.
S. Liu, B. Cheng and L. Holt, "A Practical Vulnerability Assessment Program," in IT Professional, vol. 9, no. , pp. 36-42, 2007.