National Vulnerability Database

Results: 57



#Item
31Security Content Automation Protocol / Federal Information Security Management Act / National Vulnerability Database / Vulnerability / Information security management system / Security controls / Asset / Information security / Common Vulnerabilities and Exposures / Computer security / Security / Cyberwarfare

NIST SP[removed],Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 14:56:16
32Common Vulnerabilities and Exposures / Vulnerability / Federal Information Security Management Act / Application security / National Vulnerability Database / Information security management system / Attack / Security Content Automation Protocol / Computer security / Cyberwarfare / Security

NIST SP[removed]Revision 1, Guide to Using Vulnerability Naming Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 10:15:33
33Computer network security / Crime prevention / National security / Cloud computing security / Information security / Cloud computing / Vulnerability / Database security / Corporate security / Security / Computer security / Computing

PDF Document

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2013-07-11 19:13:50
34National Vulnerability Database / Vulnerability / Automation / Asset / Security Content Automation Protocol / Information Security Automation Program / Computer security / Security / Cyberwarfare

  ITL SECURITY AUTOMATION PROGRAM   NIST, in coordination with the National Security Agency, Department of Defense, Department of Homeland Security, and industry partners, has developed technical specifications for sh

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-07-19 15:38:00
35Security / CVSS / Vulnerability / National Vulnerability Database / Application security / Attack / Social vulnerability / Patch / Security Content Automation Protocol / Computer security / Cyberwarfare / Computer network security

NISTIR 7502, The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-29 19:22:43
36Security Content Automation Protocol / CVSS / Vulnerability / Extensible Configuration Checklist Description Format / Open Vulnerability and Assessment Language / Malware / Qualys / National Vulnerability Database / Information Security Automation Program / Computer security / Cyberwarfare / Security

Security Content Automation Protocol and What It Means to Information Assurance

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:48
37Security / Common Vulnerabilities and Exposures / Computer network security / Software testing / Hacking / Security Content Automation Protocol / Vulnerability / National Vulnerability Database / Open Vulnerability and Assessment Language / Computer security / Cyberwarfare / Mitre Corporation

Common Vulnerabilities and Exposures — CVE ® The Standard for Information Security Vulnerability Names CVE is a dictionary of common names for publicly known information security vulnerabilities. CVE’s common

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2013-07-08 10:01:53
38Security / Risk / Software testing / Hacking / Vulnerability / CVSS / Common Vulnerabilities and Exposures / Social vulnerability / National Vulnerability Database / Cyberwarfare / Computer security / Computer network security

Manage Vulnerabilities Capability Data Sheet

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-03-19 13:27:17
39Security / CVSS / Vulnerability / Common Vulnerabilities and Exposures / National Vulnerability Database / Social vulnerability / Attack / Security Content Automation Protocol / SAINT / Computer security / Computer network security / Cyberwarfare

Vulnerability Management Capability Description

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-03-19 13:27:13
40CVSS / Security Content Automation Protocol / National Vulnerability Database / Common Vulnerabilities and Exposures / Vulnerability / Social vulnerability / Common Weakness Enumeration / Information Security Automation Program / Computer security / Cyberwarfare / Security

The Current State of Vulnerability Reporting

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-04 22:13:42
UPDATE