Rapid and Proactive Approach on Exploration of Database Vulnerabilities

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 2

Abstract

In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system resources like the databases and the operating systems from the attacks of the unknown outsiders. Our approach plays a major role in detecting and managing vulnerabilities in complex computing systems. It allows enterprises to assess two primary tiers through a single interface as a vulnerability scanner tool which provides a secure system which is also compatible with the security compliance of the industry. It provides an overall view of the vulnerabilities in the database, by automatically scanning them with minimum overhead. It gives a detailed view of the risks involved and their corresponding ratings. Based on these priorities, an appropriate mitigation process can be implemented to ensure a secured system. The results show that our approach could effectively optimize the time and cost involved when compared to the existing systems.

Authors and Affiliations

A. Ramachandran , S. Ramachandran

Keywords

Related Articles

Analysis and diagnosis of the different defects of asynchronous machines by vibration analysis

The electric machines and particularly the asynchronous machines act an important role nowadays in all industrial applications. To assure the availability and the safety of working of these is a fundamental job. It is th...

Review of Impulse Noise Reduction Techniques

This Paper presents survey of impulse noise reduction techniques. In this paper around ten most popular techniques are implemented and compared. Results of all algorithms are analyzed and efficiency of algorithms is calc...

A multi critria QoS Routing Protocol

The high mobility of the nodes , the reduced availability of the resources on the one hand and the rising needs of the real time applications made the provision of QoS compulsory in the ad hoc routing. Therefore the inco...

Assessment of Fraud Pretentious Business Region Research Articles Using Data Mining Approaches

In any organization, fraud detection and prevention is daunting task because millions of dollars lost with the different nature of fraudulent activities. Organizations got to engage intelligent and innovative techniques...

Discovering suffixes: A Case Study for Marathi Language

Suffix stripping is a pre-processing step required in a number of natural language processing applications. Stemmer is a tool used to perform this step. This paper presents and evaluates a rule-based and an unsupervised...

Download PDF file
  • EP ID EP92488
  • DOI -
  • Views 127
  • Downloads 0

How To Cite

A. Ramachandran, S. Ramachandran (2012). Rapid and Proactive Approach on Exploration of Database Vulnerabilities. International Journal on Computer Science and Engineering, 4(2), 224-234. https://europub.co.uk/articles/-A-92488