Vulnerability management and vulnerability assessment as a means of cybersecurity

DOI: 10.31673/2409-7292.2020.032933

Authors

  • І. С. Галузін, (Galuzin I. S.) State University of Telecommunications, Kyiv

DOI:

https://doi.org/10.31673/2409-7292.2020.032933

Abstract

The role of vulnerability management and vulnerability assessment methods in ensuring cyber security of the enterprise is considered. The functional differences between them are analyzed. The use of vulnerability management technology as the best strategy for risk identification and elimination is substantiated and the optimal way to ensure it is identified. Recommendations have been developed for organizations to achieve the maximum result of the vulnerability management process.

Keywords: vulnerability management, vulnerability assessment, vulnerability scanning, risk.

References
1. Risk management strategies. Vulnerability Assessment (Vulnerability Analysis) [Електронний ресурс] // - Режим доступу: https://searchsecurity.techtarget.com/definition/vulnerability-assessment-vulnerability-analysis/ (10.06.2020)
2. SANS Institute. Implementing a vulnerability management process [Електронний ресурс] // - Режим доступу: https://searchsecurity.techtarget.com/definition/vulnerability-assessment-vulnerability-analysis/ (10.06.2020)
3. Center for Internet Security. 20 Critical Security Controls [Електронний ресурс] // - Режим доступу: https://www.cisecurity.org/controls/cis-controls-list// (10.06.2020)
4. SANS Institute. Vulnerability Management: Tools, Challenges and Best Practices [Електронний ресурс] // - Режим доступу: https://searchsecurity.techtarget.com/definition/vulnerability-assessment-vulnerability-analysis/ (10.06.2020)

Published

2020-12-02

Issue

Section

Articles