Security Content Automation Protocol

Results: 190



#Item
1Computing / Computer security / Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Schematron / Federal Information Security Management Act / XML Schema / National Institute of Standards and Technology / Open Vulnerability and Assessment Language

NIST SP 800-126A, SCAP 1.3 Component Specification Version Updates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-18 13:17:50
2Computer security / Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / National Vulnerability Database / National Institute of Standards and Technology / Angela Orebaugh / Open Vulnerability and Assessment Language / Vulnerability / CVSS / Information Security Automation Program

NIST SPRevision 3, The Technical Specification for SCAP Version 1.3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-18 13:14:41
3Computer security / Information Security Automation Program / National security / Security Content Automation Protocol

SCAP Conformance Testing Request for Information SCAP Conformance Testing Request for Information

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:11:13
4Computer security / Security Content Automation Protocol / Evaluation / Federal Desktop Core Configuration / Computing / Federal Information Security Management Act / Validation / National Voluntary Laboratory Accreditation Program

ITL Bulletin, Updates to the NIST SCAP Validation Program and Associated Test Requirements (March 2016)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-03-15 12:05:28
5

Draft NISTIR 7511 Revision 4, Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-01-28 22:18:47
    6Computer security / Computing / Security / Security Content Automation Protocol / Mitre Corporation / Computer network security / National security / Software quality / Extensible Configuration Checklist Description Format / Common Vulnerabilities and Exposures / Vulnerability / Open Vulnerability and Assessment Language

    Standards in reporting Software Flaws: SCAP, CVE and CWE Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) School of Interdisciplinary Informatics (Si2)

    Add to Reading List

    Source URL: www.nebraskacert.org

    Language: English - Date: 2010-05-19 17:57:00
    7Security Content Automation Protocol / CVSS / Vulnerability / Common Vulnerabilities and Exposures / Adobe Flash / Adobe Acrobat / Open Vulnerability and Assessment Language / Extensible Configuration Checklist Description Format / Metadata / Software / Computing / Computer security

    Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian Abstract

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:50:49
    8Security Content Automation Protocol / CVSS / Vulnerability / Common Vulnerabilities and Exposures / Adobe Flash / Adobe Acrobat / Open Vulnerability and Assessment Language / Extensible Configuration Checklist Description Format / Metadata / Software / Computing / Computer security

    Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian Abstract

    Add to Reading List

    Source URL: www.secpod.com

    Language: English - Date: 2015-04-02 06:08:19
    9Cyberwarfare / Computer network security / Crime prevention / National security / Security Content Automation Protocol / Vulnerability / Information security / Security controls / ISO/IEC 27001 / Computer security / Security / Data security

    Microsoft Word - Compliance -1 1

    Add to Reading List

    Source URL: www.secpod.com

    Language: English - Date: 2015-03-27 09:58:01
    10Security Content Automation Protocol / Vulnerability / Countermeasure / Open Vulnerability and Assessment Language / Social vulnerability / Ontology / National Vulnerability Database / Attack / Cisco IOS / Computer security / Cyberwarfare / Security

    Avoiding Inconsistencies in the Security Content Automation Protocol William M. Fitzgerald Computer Science Department University College Cork Ireland

    Add to Reading List

    Source URL: www.cs.ucc.ie

    Language: English - Date: 2013-08-16 10:44:34
    UPDATE