Literature Review on Vulnerability Management in Cyber Security

   

Added on  2022-12-09

9 Pages2487 Words225 Views
Literature review
Literature Review on Vulnerability Management in Cyber Security_1
Table of Contents
Introduction-50................................................................................................................................1
LITERATURE REVIEW................................................................................................................1
Main body....................................................................................................................................1
Reporting.....................................................................................................................................1
Interpreting..................................................................................................................................3
Critique........................................................................................................................................3
Comparing...................................................................................................................................4
CONCLUSION................................................................................................................................5
REFERENCES................................................................................................................................6
Literature Review on Vulnerability Management in Cyber Security_2
Introduction-50
Cyber security has become the most popular concern in present times. This is because there are a
lot of cyber crime which is being occurred. It has led to breaching of confidential data and info.
There are various types of cyber crime which occurs such as phishing, fraud, etc. Thus, in order
to protect data and system there are various methods applied. Data and info has become highly
vulnerable it means they can be easily accessed and hacked.
Vulnerability management is the cyclical practice of identifying, classifying, prioritizing,
remediating, and mitigating software vulnerabilities. it is integral to computer security and
network security. This helps in finding out faults in system and security network so that relevant
measure are taken quickly to protect against vulnerability. In this report a detailed literature
review will be discussed by analysing 12 articles.
LITERATURE REVIEW
Main body
As per the view of (Immerzeel and et.al., 2020) Vulnerability is the weakness are these some
areas where you are expected or at the risk. One ability can be defined as the diminished capacity
of individual or the group of anticipate, racist recover from the impact of natural and main word
result. There are four type of vulnerability concepts that includes the human social,
environmental hazards, economic impact and their associated direct and indirect losses.
Vulnerability is not only the sign of weakness but it is also can be the greatest thing of the
person. people believe that vulnerability is about winning and losing but it’s having the courage
to show up and be seen when we have no control over the outcomes. Association with the one
ability by any of the person requires a shift in awareness in order to strengthen them themselves
emotionally an well being.
Reporting
According to the (Fu, Hardy and Duff., 2018) In the context of cyber security vulnerability
refers to the weakness in the system and that can be occur due to the weak password,
connectivity issues an and many more. it is necessary for the person to have a vulnerability
management to save themselves from the cyber security issues and they can save the information
by putting strategies like using the VPNs and other security measures that can help them to
overcome from the issues and they were able to follow the vulnerability.
1
Literature Review on Vulnerability Management in Cyber Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
National Institute of Standards and Technology (NIST) Cyber Security Framework and Terminologies
|11
|1515
|26

Leading Communication Technology
|5
|2088
|16

Physical Security and How It Relates to Cybersecurity
|14
|1219
|55

Understanding Security and Cybersecurity: Threats, Breaches, and Protection Measures
|5
|1404
|493

Cyber Security in Business Research Method
|14
|3517
|493

Information Security For Businesses
|7
|1440
|19