Design of Information System Vulnerability Governance Platform Based on Distributed Asset Acquisition and Vulnerability Verification Radar

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

There are a large number of information vulnerabilities in enterprise information systems. Many hackers use vulnerabilities to obtain enterprise or personal information, which greatly jeopardizes enterprise information security. This paper proposes a design method of integrated information system vulnerability governance platform based on distributed asset acquisition and vulnerability verification radar, discusses the business flow and architecture of the vulnerability governance platform, the logical relationship between modules, business function modules, and the technical framework for building platforms.

Cite

CITATION STYLE

APA

Shen, G., Lu, J., Shen, W., Huang, J., & Ji, W. (2019). Design of Information System Vulnerability Governance Platform Based on Distributed Asset Acquisition and Vulnerability Verification Radar. In Journal of Physics: Conference Series (Vol. 1187). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1187/3/032106

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free