Access your Pro+ Content below.
Business risks of software vulnerabilities
Sponsored by ComputerWeekly.com
This article in our Royal Holloway Information Security Thesis Series looks at how four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses.
Table Of Contents
- Software vulnerabilities
- Source of risk model
- Threat score model
Access this CW+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.