Vulnerability Management Using Open-Source Tools

N Shivananjappa, R Creutzburg - Electronic Imaging, 2024 - library.imaging.org
In today's cybersecurity landscape, protecting information systems is crucial due to the rising
threat of cyber-attacks. This research focuses on vulnerability management using open …

Senior Executives' Strategic Edicts for Consistent Information Technology Metrics over Asset Management

TJ Faulk Jr - 2024 - search.proquest.com
Data breaches of information technology (IT) resources are a concern that impacts society
and places the IT practitioner and supporting systems as targets for bad actors. There is …

Identification of Risk Factors in the Software Design Stage Using the C4. 5 Algorithm

MA Azkiya, DS Maulita - IT Journal Research and Development, 2023 - journal.uir.ac.id
A strong design phase is necessary for good software. However, design errors in software
can cause serious issues with its creation and use. Therefore, the goal of this study is to find …