Completed
Example Inclusion CD's
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
CVE Behind the Scenes - The Complexity of Being Simple
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 CVE at a Glance
- 3 CVE Editorial Board Members (As of June 4, 2001)
- 4 Vision: Using CVE in the Enterprise
- 5 CVE Enables Detailed Product Comparisons
- 6 Criteria for a Good CVE
- 7 Issue: What is a Vulnerability?
- 8 Issue: What is a Real Vulnerability?
- 9 Issue: What is a known Vulnerability?
- 10 Identifying Known Vulnerabilities: The CVE Submission Stage
- 11 Submission Conversion
- 12 Normalizing Keywords
- 13 Submission Matching
- 14 Submission Refinement
- 15 Some Challenges in Refinement
- 16 Content Decisions
- 17 Example Content Decision: SF-LOC (Software Flaws/Lines of Code)
- 18 SF-LOC Examples
- 19 Example Content Decision: SF-EXEC (Software Flaws in Multiple Executables)
- 20 Other Example Abstraction CD's
- 21 Example Inclusion CD's
- 22 Candidate Stage: Reservation
- 23 Candidate Reservation Process
- 24 CVE Growth
- 25 What's in a Name?
- 26 What's Open
- 27 Top Ten Vulnerability Types in CVE (Issues publicized between Jan 2000 and April 2001)
- 28 Managing Perspectives