Is your information security ecosystem consuming poisonous information and putting your enterprise at risk?
Gordon Mackay
Cyber Security: A Peer-Reviewed Journal, 2017, vol. 1, issue 2, 116-126
Abstract:
Information security practices and technology are rapidly evolving. Security specialists are tasked to stay up to date on the current trends and to examine and implement integrated defences that require intelligence from different information security solutions in an effort to confirm that information assets are properly protected. In today’s security ecosystems, the challenge becomes greater because systems are integrated to process more information at a rapid pace in an effort to effectively protect organisations from cybercrime. This paper explores how most vulnerability management (VM) solutions that are central to every enterprise’s information security program may contain a serious hidden flaw that could result in highly inaccurate conclusions and even higher levels of security risk exposure. The flaw present within VM solutions is related to the challenge of correlating hosts, as scanned at one point in time, to their correct counterparts, as scanned at a different point in time. This paper details the issue, consequences of inaccurate correlation and recommendations to overcome this problem.
Keywords: vulnerability management; information security; risk assessment and management; vulnerability scanning solutions; information security ecosystem; network host discovery (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2017
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/4475/download/ (application/pdf)
https://hstalks.com/article/4475/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2017:v:1:i:2:p:116-126
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().