< All Topics
  • Main
  • U-Z
  • Vulnerability Management

An Information Security Continuous Monitoring (ISCM) capability that identifies vulnerabilities [Common Vulnerabilities and Exposures (CVEs)] on devices that are likely to be used by attackers to compromise a device and use it as a platform from which to extend compromise to the network.

Source: NISTIR 8011 Vol. 1

Click to rate this post!
[Total: 0 Average: 0]
Previous Vulnerability Assessment
Table of Contents