sec-certs: Examining the security certification practice for better vulnerability mitigation.
Adam JanovskyJan JancarPetr SvendaLukasz ChmielewskiJiri MichalikVashek MatyasPublished in: Comput. Secur. (2024)
Keyphrases
- security vulnerabilities
- risk assessment
- buffer overflow
- network security
- information security
- security problems
- intrusion detection
- third party
- risk management
- security risks
- access control
- statistical databases
- security requirements
- security issues
- security threats
- security mechanisms
- high speed
- database
- sensitive data
- security protocols
- data security
- security systems
- security level
- information systems
- study guide
- encryption scheme
- information assurance
- security management
- database security
- security analysis
- security policies
- databases