Rapid and Proactive Approach on Exploration of Database Vulnerabilities

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 2

Abstract

In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system resources like the databases and the operating systems from the attacks of the unknown outsiders. Our approach plays a major role in detecting and managing vulnerabilities in complex computing systems. It allows enterprises to assess two primary tiers through a single interface as a vulnerability scanner tool which provides a secure system which is also compatible with the security compliance of the industry. It provides an overall view of the vulnerabilities in the database, by automatically scanning them with minimum overhead. It gives a detailed view of the risks involved and their corresponding ratings. Based on these priorities, an appropriate mitigation process can be implemented to ensure a secured system. The results show that our approach could effectively optimize the time and cost involved when compared to the existing systems.

Authors and Affiliations

A. Ramachandran , S. Ramachandran

Keywords

Related Articles

Association Rule Mining for Both Frequent and Infrequent Items Using Particle Swarm Optimization Algorithm

In data mining research, generating frequent items from large databases is one of the important issues and the key factor for implementing association rule mining tasks. Mining infrequent items such as relationships amon...

Context Ontology Construction For Cricket Video

Content based video retrieval systems are not complete in semantic sense. To improve the efficiency and the effectiveness of the retrieval system the content based retrieval systems must be equipped with the semantic bas...

Robust Algorithm for Impulse Noise Reduction

This Paper presents highly efficient two phase schema for removing impulse noise. In the first phase, robust algorithm for noise detection is used to identify noisy pixels. In the second phase, the image is restored usin...

Effect of Obstacles in the formation of FoV based Clusters in Wireless Multimedia Sensor Network

Wireless multimedia sensor network (WMSN) uses multimedia nodes to sense the area that are uncorrelated to the areas sensed by the neighboring sensors. Because of the extensive amount of data produced in wireless multime...

Inspiring Particle Swarm Optimization on Multi-Robot Search System

Multi-robot Search system is one area that attracts many researchers. In the field of multi-robot system one of the problem is to design a system that allow the robot to work within a team to find a target. There are man...

Download PDF file
  • EP ID EP92488
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

A. Ramachandran, S. Ramachandran (2012). Rapid and Proactive Approach on Exploration of Database Vulnerabilities. International Journal on Computer Science and Engineering, 4(2), 224-234. https://europub.co.uk/articles/-A-92488