324 index
tickets, 38–39
Industry challenges for vulnerability
management, 4–5
Inference scanning, 111–112
Information
collection, 204–205
and policy flow, 54–59
Information Assurance Vulnerability
Alert (IAVA), 197–201
Information Technology
Infrastructure Library
(ITIL), 9, 30, 36, 181–182,
305
availability management,
196–197
capacity management, 196
change management, 194–195
configuration management, 194
incident management, 192–193
IT Service Management and,
189–197
problem management, 193–194
service delivery, 195
service desk, 192
service level management,
195–196
service support, 190–192
Installation procedures, 264
Intangible risks, 259–260
Integration
customization and, 168–169
process, 155–156
system, 166
Internal vulnerabi ...