International Conference on Cyber Warfare and
Security. Academic Conferences and publishing
limited, p. 159.
Dey, D., Lahiri, A. and Zhang, G. (2015) 'Optimal Policies
for Security Patch Management', INFORMS J. on
Computing, 27(3), pp. 462-477.
Ehrenfeld, J.M. (2017) 'WannaCry, Cybersecurity and
Health Information Technology: A Time to Act',
Journal of Medical Systems, 41(7), p. 104.
Gerace, T. and Cavusoglu, H. (2009) 'The critical elements
of the patch management process', Commun. ACM,
52(8), pp. 117-121.
Goucher, W. (2011) 'Do SMEs have the right attitude
to security?', Computer Fraud and Security, 2011(7),
pp. 18-20.
Hoeksma, J. (2017) 'NHS cyberattack may prove to be a
valuable wake up call', BMJ, 357.
Kashyap, S. et al. (2016) 'Instant OS Updates via Userspace
Checkpoint-and-Restart',USENIX Annual Technical
Conference. pp. 605-619.
D Le, J Xiao, H Huang, H Wang (2014) 'Shadow patching:
Minimizing maintenance windows in a virtualized
enterprise environment', 10th International Conference
on Network and Service Management (CNSM) and
Workshop. 17-21 Nov. 2014. pp. 169-174.
Mansfield-Devine, S. (2016) 'Securing small and medium-
size businesses', Network Security, 2016(7), pp. 14-20.
Mansfield-Devine, S. (2017) 'Ransomware: the most
popular form of attack', Computer Fraud and Security,
2017(10), pp. 15-20.
McAfee (2017) Malware and Threat Reports: Threat
Advisory - Ransomware-Erebus (PD27141). McAfee,
CA, USA: McAfee Labs Knowledge Center.
Mell, P., Bergeron, T. and Henning, D. (2005) 'Creating
a patch and vulnerability management program', NIST
Special Publication, 800, p. 40.
O’Brien, D. (2017) Internet Security Threat Report (ISTR)
Ransomware 2017: An ISTR SpecialReport. Symantec
Corporation, Mountain View, CA, USA.
Okhravi, H. and Nicol, D. (2008) 'Evaluation of patch
management strategies', International Journal of
i
https://ksplice.oracle.com
ii
https://access.redhat.com/articles/2475321
iii
https://www.suse.com/documentation/sles-12/
book_sle_admin/data/cha_kgraft.html
iv
https://github.com/vFense/vFense
v
https://fai-project.org
vi
https://spacewalkproject.github.io
vii
https://www.ibm.com/security/endpoint-security/bigfix
viii
https://www.ivanti.com
ix
https://access.redhat.com/products/red-hat-satellite
x
https://www.solarwinds.com/patch-manager
xi
https://www.flexera.com/enterprise/products/software-
vulnerability-management/corporate-software-
inspector
xii
https://www.kaseya.com/resource/kaseya-patch-mana
gement
xiii
https://www.gfi.com/products-and-solutions/network-
security-solutions/gfianguard/specifications/patch-
management-for-operating-systems
Computational Intelligence: Theory and Practice, 3(2),
pp. 109-117.
Palumbo, T. (2015) 'Patch Management: The Importance of
Implementing Central Patch Management and Our
Experiences Doing So', Proceedings of the 2015 ACM
Annual Conference on SIGUCCS. St. Petersburg,
Florida, USA. 2815561: ACM, pp. 105-108.
Pressman, R.S. (2010) Software engineering: a
practitioner's approach. 7th edn.: Palgrave Macmillan.
Rajput, T.S. (2017) 'Evolving Threat Agents: Ransomware
and their Variants', International Journal of Computer
Applications, 164(7), pp. 28-34.
Rankin, K. (2017) 'Hack and /: sysadmin 101: patch
management', Linux Journal, 2017(279),p. 5.
Rankin, K. (2017) 'Hack and /: Orchestration with
MCollective, Part II', Linux Journal2017(273), p. 5
Renaud, K. (2016) 'How smaller businesses struggle with
security advice', Computer Fraud and Security,
2016(8), pp. 10-18.
Seo, J.-T. Choi D-S, Park E-K, Shon T-S, Moon J. (2005)
'Patch Management System for Multi-platform
Environment', Parallel and Distributed Computing:
Applications and Technologies. PDCAT 2004. Berlin,
Heidelberg. Springer Berlin Heidelberg, pp. 654-661.
Seo, J.-T. Kim Y-J, Park E-K, Lee S-W, Shon K, Moon J..
(2006) 'Design and Implementation of a Patch
Management System to Remove Security
Vulnerability in Multi-platforms', Fuzzy Systems and
Knowledge Discovery.FSKD 2006. Berlin, Heidelberg.
Springer Berlin Heidelberg, pp. 716-724.
Souppaya, M. and Scarfone, K. (2013) 'Guide to
enterprise patch management technologies', NIST
Special Publication, 800, p. 40.
US-CERT (United States Computer Emergency Readiness
Team) (2015) Top 30 Targeted High Risk
Vulnerabilities (TA15–119A). Washington, DC.
Available at: https://www.us- cert.gov/ncas/alerts/
TA15-119A (Accessed: 29 June 2018).
Walberg, S. (2008) 'Automate system administration tasks
with puppet', Linux J., 2008(176), p. 5.
xiv
https://www.manageengine.co.uk/patch-management/
knowledge-base/overview.html
xv
https://www.microfocus.com/products/zenworks/patch-
management
xvi
https://www.cloudmanagementsuite.com
xvii
http://www.bmc.com/it-solutions/bladelogic-server-
automation.html
xviii
https://www.quest.com/products/kace-systems-manage
ment-appliance/patch-management-
security.aspx
xix
http://www.celeryproject.org
xx
http://eventlet.net
xxi
https://pypi.org/project/django_celery_results
xxii
https://www.rabbitmq.com
xxiii
https://www.fabfile.org
xxiv
https://getbootstrap.com
xxv
https://github.com/CodeSeven/toastr