This paper summarises the results of a Dutch PhD research project on IT security vulnerability and incident response management, which is supervised by the University of Twente in the Netherlands and which is currently in its final stage. Vulnerabilities are ‘failures or weaknesses in computer (application) system design, implementation or operation which can be exploited to violate the security policy defined for that system’. Incidents are defined as ‘events that have actual or potentially adverse effects on computer or network operations resulting in fraud, waste or abuse, compromise of information or loss or damage of property of information’. Hacking, denial-of-service attacks and computer viruses are examples of such events. The resea...
With the implementation of smarter electric power distribution grids follows new technologies, which...
The primary objective of this thesis was to improve vulnerability management within cybersecurity d...
This thesis was done for the Product Security Incident Response Team (PSIRT) of a large IT company....
The early version of the Internet was designed for connectivity only, without the consideration of s...
The importance of cyber protection is increasing, and as reported by the Global Risks Report 2020, c...
Purpose – The purpose of this paper is to examine security incident response practices of informatio...
Abstract: Past efforts to protect and mitigate attacks have resulted in the development of security ...
This paper presents the main results of a survey held by de Vrije Universiteit and KPMG EDP Auditors...
Addressing security vulnerabilities and system intrusions can represent a significant administrative...
Modern IT companies manage security of their customers'networks following particular models, process...
Modern IT companies manage security of their customers'networks following particular models, process...
Modern IT companies manage security of their customers'networks following particular models, process...
Modern IT companies manage security of their customers'networks following particular models, process...
Information Security is an important aspect of decision making in organisations today. Organisations...
In the recent years Information Technology has been under various different threats most of the thre...
With the implementation of smarter electric power distribution grids follows new technologies, which...
The primary objective of this thesis was to improve vulnerability management within cybersecurity d...
This thesis was done for the Product Security Incident Response Team (PSIRT) of a large IT company....
The early version of the Internet was designed for connectivity only, without the consideration of s...
The importance of cyber protection is increasing, and as reported by the Global Risks Report 2020, c...
Purpose – The purpose of this paper is to examine security incident response practices of informatio...
Abstract: Past efforts to protect and mitigate attacks have resulted in the development of security ...
This paper presents the main results of a survey held by de Vrije Universiteit and KPMG EDP Auditors...
Addressing security vulnerabilities and system intrusions can represent a significant administrative...
Modern IT companies manage security of their customers'networks following particular models, process...
Modern IT companies manage security of their customers'networks following particular models, process...
Modern IT companies manage security of their customers'networks following particular models, process...
Modern IT companies manage security of their customers'networks following particular models, process...
Information Security is an important aspect of decision making in organisations today. Organisations...
In the recent years Information Technology has been under various different threats most of the thre...
With the implementation of smarter electric power distribution grids follows new technologies, which...
The primary objective of this thesis was to improve vulnerability management within cybersecurity d...
This thesis was done for the Product Security Incident Response Team (PSIRT) of a large IT company....