본문 바로가기

IT 와 Social 이야기/Security419

[US-CERT: Bulletin(SB15-054)] 2015년 2월 16일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be.. 2015. 2. 24.
[IBM Security Systems] Big Data Requires Big Protection Big Data Requires Big Protection from IBM Security Systems 2015. 2. 24.
[US-CERT: Bulletin(SB15-047)] 2015년 2월 9일까지 발표된 보안 취약점 [US-CERT: Bulletin(SB15-047)] 2015년 2월 9일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS ba.. 2015. 2. 17.
[US-CERT: Bulletin(SB15-040)] 2015년 2월 2일까지 발표된 보안 취약점 [US-CERT: Bulletin(SB15-040)] 2015년 2월 2일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS ba.. 2015. 2. 10.