Appl. Sci.
2020, 10, 7926
13 of 16
Funding:
Wrocław University for Science and Technology, grant No CYBERSECIDENT/381690/ II/NCBR/2018 from
National Centre for Research and Development within the CyberSecIdent-Cybersecurity and e-Identity program.
Acknowledgments:
The authors wish to thank Wroclaw University of Science and Technology (statutory
activity) for financial support and Agata Szewczyk for proofreading and translation. This publication
was created as a part of the Regional Security Operations Center (RegSOC) project (Regionalne Centrum
Bezpiecze ´nstwa Cybernetycznego), cofinanced by the National Centre for Research and Development as part of
the CyberSecIdent-Cybersecurity and e-Identity program.
Conflicts of Interest:
The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
API
Application Programming Interface
CIA
Confidentiality, Integrity and Accessibility
CMDB
Configuration Management Database
CVE
Common Vulnerabilities and Exposures
CVSS
Common Vulnerability Scoring System
DCIM
Data Center Infrastructure Management
ID
Identification
IDS
Intrusion Detection System
IoT
Internet of Things
IPS
Intrusion Prevention system
IT
Information Technology
K8S
Kubernetes cluster
NVD
National Vulnerabilities Database
OVM
Ontology for Vulnerability Management
P
Proposed Test cased
SOC
Security Operations Center
TD
Target Distribution
US
United States
VA
Vulnerability Assessment
VLAN
Virtual Local-Area Network
VM
Vulnerability Management
VMC
Vulnerability Management Centre
Do'stlaringiz bilan baham: