보안402 [CIOkorea.com] 데이터 중심적 보안에 필요한 7가지 1. 데이터 디스커버리 2. 가시성 3. 분류 4. 접근 관리 5. 통제 6. 거버넌스 & 준수성 7. 암호화 [CIOkorea.com] 데이터 중심적 보안에 필요한 10가지 2016. 9. 9. [US-CERT: Bulletin(SB16-235)] 2016년 8월 15일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be.. 2016. 8. 23. [US-CERT: Bulletin(SB16-228)] 2016년 8월 8일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be.. 2016. 8. 16. [US-CERT: Bulletin(SB16-200)] 2016년 7월 11일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be.. 2016. 7. 19. 이전 1 ··· 37 38 39 40 41 42 43 ··· 101 다음