Identifying and securing sensitive data at its source
R Grondin, R Gupta - US Patent 9,785,795, 2017 - Google Patents
(57) ABSTRACT A data management service identifies sensitive data stored on enterprise
databases according to record classification rules that classify a data record as having a …
databases according to record classification rules that classify a data record as having a …
Assessment type-variable enterprise security impact analysis
R Grondin, R Gupta, B Kumaresan - US Patent 9,762,603, 2017 - Google Patents
A data management service identifies sensitive data stored on enterprise databases
according to record classification rules that classify a data record as having a sensitive data …
according to record classification rules that classify a data record as having a sensitive data …
Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis
SNG Gourisetti, M Mylrea, H Patangia - Future Generation Computer …, 2020 - Elsevier
Existing cybersecurity vulnerability assessment tools were designed based on the policies
and standards defined by organizations such as the US Department of Energy and the …
and standards defined by organizations such as the US Department of Energy and the …
CAVP: A context-aware vulnerability prioritization model
With the growing number of vulnerabilities while attacks are becoming more advanced,
known software security vulnerabilities need to be managed more efficiently with …
known software security vulnerabilities need to be managed more efficiently with …
Using mcda for selecting criteria of lgpd compliant personal data security
R Carauta Ribeiro, E Dias Canedo - The 21st Annual International …, 2020 - dl.acm.org
The protection of personal data is a problem that has been discussed in several countries.
Most countries create laws and regulations to protect fundamental rights and privacy. The …
Most countries create laws and regulations to protect fundamental rights and privacy. The …
A vulnerability risk assessment method based on heterogeneous information network
W Wang, F Shi, M Zhang, C Xu, J Zheng - IEEE Access, 2020 - ieeexplore.ieee.org
Due to the increasing number of network security vulnerabilities, vulnerability risk
assessment must be performed to prioritize the repair of high-risk vulnerabilities. Traditional …
assessment must be performed to prioritize the repair of high-risk vulnerabilities. Traditional …
From analyzing operating system vulnerabilities to designing multiversion intrusion-tolerant architectures
This paper analyzes security problems of modern computer systems caused by
vulnerabilities in their operating systems (OSs). Our scrutiny of widely used enterprise OSs …
vulnerabilities in their operating systems (OSs). Our scrutiny of widely used enterprise OSs …
Predicting exploitations of information systems vulnerabilities through attackers' characteristics
A Dobrovoljc, D Trček, B Likar - Ieee Access, 2017 - ieeexplore.ieee.org
The main goal of proactive security is to prevent attacks before they happen. In modern
information systems it largely depends on the vulnerability management process, where …
information systems it largely depends on the vulnerability management process, where …
Risk model development for information security in organization environment based on business perspectives
Digital information plays an essential role in supporting organizational business. However,
incidents of sensitive information leakage often happen in organization environment …
incidents of sensitive information leakage often happen in organization environment …
[PDF][PDF] A Novel Automatic Severity Vulnerability Assessment Framework.
T Wen, Y Zhang, Y Dong, G Yang - J. Commun., 2015 - jocm.us
Security vulnerabilities play an important role in network security. With the development of
the network and the increasing number of vulnerabilities, many Quantitative Vulnerability …
the network and the increasing number of vulnerabilities, many Quantitative Vulnerability …