Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Elizabeth B. Lennon;|
|Title:||Security Patches and the CVE Vulnerability Naming Scheme: Tools to Address Computer System Vulnerabilities|
|Published:||October 01, 2002|
|Abstract:||: Today more than ever, timely response to vulnerabilities is critical to maintain the operational availability, confidentiality, and integrity of information technology (IT) systems. To assist federal agencies and industry respond to vulnerabilities in a timely manner, ITL recently released two new publications dealing with vulnerabilities in computer systems: NIST Special Publication (SP) 800-40, Procedures for Handling Security Patches, by Peter Mell and Miles C. Tracy, and NIST SP 800-51, Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme, by Peter Mell and Tim Grance. This ITL Bulletin summarizes these two documents on system vulnerabilities, available at http://csrc.nist.gov/publications/nistpubs/index.html.|
|Citation:||Security Patches and the CVE Vulnerability Naming Scheme: Tools to Address Computer System Vulnerabilities|
|Keywords:||common vulnerabilities and exposures CVE,computer security,CVE,security patches,vulnerabilities,vulnerability naming scheme|
|PDF version:||Click here to retrieve PDF version of paper (308KB)|