YoVDO

Vulntology - A Methodology to Characterize Vulnerabilities with Granular and Intuitive Structure

Offered By: Linux Foundation via YouTube

Tags

Vulnerability Management Courses Cybersecurity Courses Risk Assessment Courses Threat Modeling Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive methodology for characterizing vulnerabilities in this 45-minute conference talk by Christopher Turner from the National Institute of Standards and Technology. Delve into the Vulntology framework, which offers a granular and intuitive structure for understanding and classifying security vulnerabilities. Learn about the challenges posed by language barriers and structural changes in vulnerability descriptions. Examine key components of the methodology, including the Vulnerability Object, Vulnerability Identifier Object, Scenario Object, Product Object, Barrier Object, Action Object, and Impact Object. Gain insights into both single and multiple scenario applications of Vulntology. Conclude with a recap of the presented concepts, equipping yourself with a powerful tool for enhancing cybersecurity practices and communication.

Syllabus

Intro
Light Overview
Problems: Language Barriers
Structure Changes
Vulnerability Object
Vulnerability Identifier Object
Scenario Object
Product Object
Barrier Object
Action Object
Impact Object
Single Scenario
Multiple Scenarios
Recap


Taught by

Linux Foundation

Tags

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network