Rapid and Proactive Approach on Exploration of Database Vulnerabilities

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 2

Abstract

In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system resources like the databases and the operating systems from the attacks of the unknown outsiders. Our approach plays a major role in detecting and managing vulnerabilities in complex computing systems. It allows enterprises to assess two primary tiers through a single interface as a vulnerability scanner tool which provides a secure system which is also compatible with the security compliance of the industry. It provides an overall view of the vulnerabilities in the database, by automatically scanning them with minimum overhead. It gives a detailed view of the risks involved and their corresponding ratings. Based on these priorities, an appropriate mitigation process can be implemented to ensure a secured system. The results show that our approach could effectively optimize the time and cost involved when compared to the existing systems.

Authors and Affiliations

A. Ramachandran , S. Ramachandran

Keywords

Related Articles

A Study of AC/DC Converter with Improved Power Factor and Low Harmonic Distortion

AC/DC converters are widely used in industrial applications. Input AC voltage is rectified and filtered using filtering circuit which consists of large electrolytic capacitors. These capacitors draw a large amount of cur...

Design and Development of Wireless Sensor Network System to Monitor Parameters Influencing Freshwater Fishes

In this paper we have designed, developed and proposed a prototype Wireless Sensor Network (WSN) System to monitor the Fish Farm. Salinity of the fresh water is a prominent parameter and is responsible for the difference...

iImplementation of AMBA AHB protocol for high capacity memory management using VHDL

Microprocessor performance has improved rapidly these years. In contrast memory latencies and bandwidths have improved little. The result is that the memory access time is the bottleneck which limits the system performan...

Cluster Analysis Research Design model, problems, issues, challenges, trends and tools

Clustering is the process of grouping a set of objects into classes. In the last decade cluster analysis research gained significant interest among researchers. This paper is intended to propose research design model for...

UNICODE and Colors Integration tool for Encryption and Decryption

Cryptography, to most people, is concerned with keeping communications private. Indeed, the protection of sensitive communications has been the emphasis of cryptography throughout much of its history. Encryption is the t...

Download PDF file
  • EP ID EP92488
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

A. Ramachandran, S. Ramachandran (2012). Rapid and Proactive Approach on Exploration of Database Vulnerabilities. International Journal on Computer Science and Engineering, 4(2), 224-234. https://europub.co.uk/articles/-A-92488