The common configuration scoring system (CCSS): metrics for software security configuration vulnerabilities (draft) (Perfect)
5 Angebote vergleichen

Preise2012201320142015
Schnitt 11,45 31,31 29,85 38,73
Nachfrage
Bester Preis: 9,91 (vom 21.08.2012)
1
9781234114633 - Katholik Eine Religiose Zeitschrift Zur Belehrung Und Warnung (31-32 )
Symbolbild

Katholik Eine Religiose Zeitschrift Zur Belehrung Und Warnung (31-32 ) (2009)

Lieferung erfolgt aus/von: Vereinigte Staaten von Amerika EN PB NW

ISBN: 9781234114633 bzw. 1234114631, in Englisch, RareBooksClub, Taschenbuch, neu.

38,73 + Versand: 4,10 = 42,83
unverbindlich
Von Händler/Antiquariat, BuySomeBooks [52360437], Las Vegas, NV, U.S.A.
This item is printed on demand. Paperback. 44 pages. Original publisher: Gaithersburg, MD : U. S. Dept. of Commerce, National Institute of Standards and Technology, 2009 OCLC Number: (OCoLC)406506728 Subject: Software configuration management. Excerpt: . . . ETRICS FOR OFTWARE ECURITY ONFIGURATION ULNERABILITIES CCSS: M S S C V ( DRAFT ) 10 other non-network interface ). If the user must authenticate as a valid database user in order to exploit the weakness, then this metric should be set to Single. There are no distinctions between active and passive exploitation in assigning values to this metric. Table 2. Authentication Scoring Evaluation Metric Description Value Multiple Exploiting the weakness requires that the exploiter authenticate two or more times, even if the same ( M ) credentials are used each time. An example is an exploiter authenticating to an operating system in addition to providing credentials to access an application hosted on that system. Single ( S ) One instance of authentication is required to access and exploit the weakness. None ( N ) Authentication is not required to access and exploit the weakness. The metric should be applied based on the authentication the exploiter requires before launching an attack. For example, suppose that a mail server is configured to permit use of an optional command that reveals server configuration information. If this command can be used by a person without first authenticating to the mail server, the metric should be set to None because the exploiter can launch the exploit before credentials are required. If the command can only be used after successful authentication to the mail server, then the weakness should be set to Single or Multiple, depending on how many instances of authentication must occur before issuing the command. 2. 1. 1. 4 Access Complexity ( AC ) The Access Complexity metric reflects the complexity of the attack required to exploit the configuration issue. The Access Complexity metric is assigned differently depending upon wh. . . This item ships from La Vergne,TN.
2
9781234114633 - U.S. Government: The common configuration scoring system (CCSS): metrics for software security configuration vulnerabilities (draft)
Symbolbild
U.S. Government

The common configuration scoring system (CCSS): metrics for software security configuration vulnerabilities (draft) (2009)

Lieferung erfolgt aus/von: Vereinigte Staaten von Amerika EN PB NW

ISBN: 9781234114633 bzw. 1234114631, in Englisch, Taschenbuch, neu.

42,93 + Versand: 2,66 = 45,59
unverbindlich
Von Händler/Antiquariat, BuySomeBooks [52360437], Las Vegas, NV, U.S.A.
This item is printed on demand. Paperback. Original publisher: Gaithersburg, MD : U. S. Dept. of Commerce, National Institute of Standards and Technology, 2009 OCLC Number: (OCoLC)406506728 Subject: Software configuration management. Excerpt: . . . ETRICS FOR OFTWARE ECURITY ONFIGURATION ULNERABILITIES CCSS: M S S C V ( DRAFT ) 10 other non-network interface ). If the user must authenticate as a valid database user in order to exploit the weakness, then this metric should be set to Single. There are no distinctions between active and passive exploitation in assigning values to this metric. Table 2. Authentication Scoring Evaluation Metric Description Value Multiple Exploiting the weakness requires that the exploiter authenticate two or more times, even if the same ( M ) credentials are used each time. An example is an exploiter authenticating to an operating system in addition to providing credentials to access an application hosted on that system. Single ( S ) One instance of authentication is required to access and exploit the weakness. None ( N ) Authentication is not required to access and exploit the weakness. The metric should be applied based on the authentication the exploiter requires before launching an attack. For example, suppose that a mail server is configured to permit use of an optional command that reveals server configuration information. If this command can be used by a person without first authenticating to the mail server, the metric should be set to None because the exploiter can launch the exploit before credentials are required. If the command can only be used after successful authentication to the mail server, then the weakness should be set to Single or Multiple, depending on how many instances of authentication must occur before issuing the command. 2. 1. 1. 4 Access Complexity ( AC ) The Access Complexity metric reflects the complexity of the attack required to exploit the configuration issue. The Access Complexity metric is assigned differently depending upon wh. . . This item ships from La Vergne,TN.
3
9781234114633 - U.S. Government: The common configuration scoring system (CCSS): metrics for software security configuration vulnerabilities (draft) (Perfect)
Symbolbild
U.S. Government

The common configuration scoring system (CCSS): metrics for software security configuration vulnerabilities (draft) (Perfect)

Lieferung erfolgt aus/von: Deutschland EN NW

ISBN: 9781234114633 bzw. 1234114631, in Englisch, neu.

32,33 + Versand: 15,42 = 47,75
unverbindlich
Von Händler/Antiquariat, ABC Books [9235530], Lowfield Heath, CRAWL, United Kingdom.
Perfect. Original publisher: Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009] OCLC Number: (OCoLC)406506728 Subject: Software con.Shipping may be from our UK, US or Australian warehouse depending on stock availability. This item is printed on demand. 44 pages. 0.100.
4
9781234114633 - U. S. Government, Anonymous: The Common Configuration Scoring System (Ccss): Metrics for Software Security Configuration Vulnerabilities (Draft)
U. S. Government, Anonymous

The Common Configuration Scoring System (Ccss): Metrics for Software Security Configuration Vulnerabilities (Draft) (2013)

Lieferung erfolgt aus/von: Vereinigte Staaten von Amerika EN NW

ISBN: 9781234114633 bzw. 1234114631, in Englisch, General Books LLC, General Books LLC, General Books LLC, neu.

23,65 ($ 32,53)¹
unverbindlich
Lieferung aus: Vereinigte Staaten von Amerika, zzgl. Versandkosten, Free Shipping on eligible orders over $25.
U. S. Government, Anonymous,Paperback, English-language edition,Pub by General Books LLC.
5
9781234114633 - U S Government, Anonymous: Katholik; Eine Religiose Zeitschrift Zur Belehrung Und Warnung (31-32 )
Symbolbild
U S Government, Anonymous

Katholik; Eine Religiose Zeitschrift Zur Belehrung Und Warnung (31-32 ) (2013)

Lieferung erfolgt aus/von: Deutschland EN NW

ISBN: 9781234114633 bzw. 1234114631, in Englisch, neu.

Lieferung aus: Deutschland, Versandkostenfrei.
Von Händler/Antiquariat, Deastore [50723639], Roma, ROMA, Italy.
Language: eng, ger. Print On Demand.
Lade…