Abstract
This article presents the results of an investigation of literature and the development of a method that management can use to understand and prioritise software vulnerabilities.
Original language | English |
---|---|
Pages | 1-11 |
Number of pages | 11 |
Specialist publication | Computer Weekly |
Publication status | Published - Mar 2015 |
Keywords
- Computer Weekly Royal Holloway info security thesis series
- software vulnerabilities
- THREAT
- business risks