Using Vulnerability Assessment Tools To Develop an OCTAVE Risk Profile

Threats to information technology are ever increasing and many organizations are spending much money and time in attempting to fix security problems. Before one can think about remediation, assets worth protecting and knowing what to protect those assets from must be defined. OCTAVE characterizes a...
By Andrew Storms
March 25, 2004

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg