Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
This project aims to develop a tool that scans a remote computer and then presents a system administrator with a summary of what the remote computer looks like from the outside. The summary will include detailed information on the vulnerabilities and exposures that are being presented to the outside world and instructions on how to minimize the associated risk. The database was designed to support the Network Risk Analysis and Distributed Intrusion Detection systems, and we determined that automated source fusion was not needed. Time that would have been devoted to automated source fusion was instead devoted to additional performance evaluation of the two systems.