Identifying and securing sensitive data at its source

R Grondin, R Gupta - US Patent 9,785,795, 2017 - Google Patents
(57) ABSTRACT A data management service identifies sensitive data stored on enterprise
databases according to record classification rules that classify a data record as having a …

Assessment type-variable enterprise security impact analysis

R Grondin, R Gupta, B Kumaresan - US Patent 9,762,603, 2017 - Google Patents
A data management service identifies sensitive data stored on enterprise databases
according to record classification rules that classify a data record as having a sensitive data …

Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis

SNG Gourisetti, M Mylrea, H Patangia - Future Generation Computer …, 2020 - Elsevier
Existing cybersecurity vulnerability assessment tools were designed based on the policies
and standards defined by organizations such as the US Department of Energy and the …

CAVP: A context-aware vulnerability prioritization model

B Jung, Y Li, T Bechor - Computers & Security, 2022 - Elsevier
With the growing number of vulnerabilities while attacks are becoming more advanced,
known software security vulnerabilities need to be managed more efficiently with …

Using mcda for selecting criteria of lgpd compliant personal data security

R Carauta Ribeiro, E Dias Canedo - The 21st Annual International …, 2020 - dl.acm.org
The protection of personal data is a problem that has been discussed in several countries.
Most countries create laws and regulations to protect fundamental rights and privacy. The …

A vulnerability risk assessment method based on heterogeneous information network

W Wang, F Shi, M Zhang, C Xu, J Zheng - IEEE Access, 2020 - ieeexplore.ieee.org
Due to the increasing number of network security vulnerabilities, vulnerability risk
assessment must be performed to prioritize the repair of high-risk vulnerabilities. Traditional …

From analyzing operating system vulnerabilities to designing multiversion intrusion-tolerant architectures

A Gorbenko, A Romanovsky, O Tarasyuk… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
This paper analyzes security problems of modern computer systems caused by
vulnerabilities in their operating systems (OSs). Our scrutiny of widely used enterprise OSs …

Predicting exploitations of information systems vulnerabilities through attackers' characteristics

A Dobrovoljc, D Trček, B Likar - Ieee Access, 2017 - ieeexplore.ieee.org
The main goal of proactive security is to prevent attacks before they happen. In modern
information systems it largely depends on the vulnerability management process, where …

Risk model development for information security in organization environment based on business perspectives

PD Ibnugraha, LE Nugroho, PI Santosa - International Journal of …, 2021 - Springer
Digital information plays an essential role in supporting organizational business. However,
incidents of sensitive information leakage often happen in organization environment …

[PDF][PDF] A Novel Automatic Severity Vulnerability Assessment Framework.

T Wen, Y Zhang, Y Dong, G Yang - J. Commun., 2015 - jocm.us
Security vulnerabilities play an important role in network security. With the development of
the network and the increasing number of vulnerabilities, many Quantitative Vulnerability …