From the course: Secure Data Management for AI Implementation

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Vulnerability assessment and patch management

Vulnerability assessment and patch management - MySQL Tutorial

From the course: Secure Data Management for AI Implementation

Vulnerability assessment and patch management

- [Presenter] Data systems, since their inception, have set and reinforced boundaries around data assets. These systems have protected data by classifying users and objects using predetermined security labels. Multi-level security prevents unauthorized users from accessing information at a higher classification than their authorization, and prevents users from declassifying information. AI power techniques, such as vulnerability assessment and patch management, have made multi-level security execution easier. AI approaches increase the likelihood of proactively identifying issues, and hopefully patching them before they affect other parts of the system. Vulnerability assessment is the first stage of vulnerability management. It targets defining, identifying, classifying, and prioritizing vulnerabilities across computing systems, applications, and network infrastructures. These vulnerabilities infiltrate our environment via…

Contents