EconPapers    
Economics at your fingertips  
 

The PIVO process for identifying vulnerabilities impact for organisation risks: An automated solution

Jean-Luc Simoni, Alexis Ulliac, Thomas Massip and Thomas Devaux
Additional contact information
Jean-Luc Simoni: Thales SIX GTS France, France
Alexis Ulliac: Thales SIX GTS France, France
Thomas Massip: Thales SIX GTS France, France
Thomas Devaux: Thales SIX GTS France, France

Cyber Security: A Peer-Reviewed Journal, 2022, vol. 6, issue 1, 62-78

Abstract: Risk management (RM) and vulnerability management (VM) are both essential cyber security domains. They are often managed independently without a proper interface to provide context information to each other and share information. This paper proposes an approach to connect RM and VM processes based on data standardisation through referential and automation to relate vulnerabilities to operational risk scenarios. The focus is mainly on the identification of the referential and their added value to complement a method described in a previous paper.

Keywords: vulnerability management; risk management; CMDB; automation; CVSS; cyber kill chain (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2022
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/7182/download/ (application/pdf)
https://hstalks.com/article/7182/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2022:v:6:i:1:p:62-78

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:csj000:y:2022:v:6:i:1:p:62-78