Vulnerability management and vulnerability assessment as a means of cybersecurity
DOI: 10.31673/2409-7292.2020.032933
DOI:
https://doi.org/10.31673/2409-7292.2020.032933Abstract
The role of vulnerability management and vulnerability assessment methods in ensuring cyber security of the enterprise is considered. The functional differences between them are analyzed. The use of vulnerability management technology as the best strategy for risk identification and elimination is substantiated and the optimal way to ensure it is identified. Recommendations have been developed for organizations to achieve the maximum result of the vulnerability management process.
Keywords: vulnerability management, vulnerability assessment, vulnerability scanning, risk.
References
1. Risk management strategies. Vulnerability Assessment (Vulnerability Analysis) [Електронний ресурс] // - Режим доступу: https://searchsecurity.techtarget.com/definition/vulnerability-assessment-vulnerability-analysis/ (10.06.2020)
2. SANS Institute. Implementing a vulnerability management process [Електронний ресурс] // - Режим доступу: https://searchsecurity.techtarget.com/definition/vulnerability-assessment-vulnerability-analysis/ (10.06.2020)
3. Center for Internet Security. 20 Critical Security Controls [Електронний ресурс] // - Режим доступу: https://www.cisecurity.org/controls/cis-controls-list// (10.06.2020)
4. SANS Institute. Vulnerability Management: Tools, Challenges and Best Practices [Електронний ресурс] // - Режим доступу: https://searchsecurity.techtarget.com/definition/vulnerability-assessment-vulnerability-analysis/ (10.06.2020)