- Title
- Limiting vulnerability exposure through effective patch management: threat mitigation through vulnerability remediation
- Creator
- White, Dominic Stjohn Dolin
- Subject
- Computer networks -- Security measures
- Subject
- Computer viruses
- Subject
- Computer security
- Date Issued
- 2007
- Date
- 2007
- Date
- 2007-02-08
- Type
- Thesis
- Type
- Masters
- Type
- MSc
- Identifier
- vital:4629
- Identifier
- http://hdl.handle.net/10962/d1006510
- Identifier
- Computer networks -- Security measures
- Identifier
- Computer viruses
- Identifier
- Computer security
- Description
- This document aims to provide a complete discussion on vulnerability and patch management. The first chapters look at the trends relating to vulnerabilities, exploits, attacks and patches. These trends describe the drivers of patch and vulnerability management and situate the discussion in the current security climate. The following chapters then aim to present both policy and technical solutions to the problem. The policies described lay out a comprehensive set of steps that can be followed by any organisation to implement their own patch management policy, including practical advice on integration with other policies, managing risk, identifying vulnerability, strategies for reducing downtime and generating metrics to measure progress. Having covered the steps that can be taken by users, a strategy describing how best a vendor should implement a related patch release policy is provided. An argument is made that current monthly patch release schedules are inadequate to allow users to most effectively and timeously mitigate vulnerabilities. The final chapters discuss the technical aspect of automating parts of the policies described. In particular the concept of 'defense in depth' is used to discuss additional strategies for 'buying time' during the patch process. The document then goes on to conclude that in the face of increasing malicious activity and more complex patching, solid frameworks such as those provided in this document are required to ensure an organisation can fully manage the patching process. However, more research is required to fully understand vulnerabilities and exploits. In particular more attention must be paid to threats, as little work as been done to fully understand threat-agent capabilities and activities from a day to day basis.
- Description
- TeX output 2007.02.08:2212
- Description
- Adobe Acrobat 9.51 Paper Capture Plug-in
- Format
- 203 p.
- Format
- Publisher
- Rhodes University
- Publisher
- Faculty of Science, Computer Science
- Language
- English
- Rights
- White, Dominic Stjohn Dolin
- Hits: 1983
- Visitors: 2123
- Downloads: 178
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details Download | SOURCEPDF | 1 MB | Adobe Acrobat PDF | View Details Download |