Search GSSD

The Vulnerability Process: A tiger team approach to resolving vulnerability cases

Abstract: 
Addresses the range of security vulnerabilities when a new software program is introduced on the market for consumers. It endeavors to provide a systematic approach to reporting and resolving these common forms of software protocol vulnerabilities. Additionally it describes the life-cycle model using check-point metrics and applies a specific case study to illustrate how vulnerability reports are generated via their company’s professional security system. The vulnerability report process is centered around three main pillars to help identify and remedy the error: originating, coordinating, and repairing.
Author: 
Marko Laakso, et. al.,
Institution: 
CERTS: Secure Programming Group - University of Oulu Finald (OUSPG).
Year: 
1999
Dimensions-Problem/Solution: 
Region(s): 
Industry Focus: 
Information & Telecommunication
Internet & Cyberspace
Country: 
Finalnd
Datatype(s): 
Models
Policies
Organizations
Theory/Definition