Rapid and Proactive Approach on Exploration of Database Vulnerabilities
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 2
Abstract
In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system resources like the databases and the operating systems from the attacks of the unknown outsiders. Our approach plays a major role in detecting and managing vulnerabilities in complex computing systems. It allows enterprises to assess two primary tiers through a single interface as a vulnerability scanner tool which provides a secure system which is also compatible with the security compliance of the industry. It provides an overall view of the vulnerabilities in the database, by automatically scanning them with minimum overhead. It gives a detailed view of the risks involved and their corresponding ratings. Based on these priorities, an appropriate mitigation process can be implemented to ensure a secured system. The results show that our approach could effectively optimize the time and cost involved when compared to the existing systems.
Authors and Affiliations
A. Ramachandran , S. Ramachandran
Perceptual Wavelet packet transform based Wavelet Filter Banks Modeling of Human Auditory system for improving the intelligibility of voiced and unvoiced speech: A Case Study of a system development
The objective of this project is to discuss a versatile speech enhancement method based on the human auditory model. In this project a speech enhancement scheme is being described which meets the demand for quality noise...
Discovering Communities in Social Networks Through Mutual Accessibility
Social network gains popularity due to its ease of use, as an application of Web 2.0 which facilitates users to communicate, interact and share on the World Wide Web. A Social network is a set of people or organizations...
Customer Relationship Management System with USCM-AKD Approach of D3M
Customer Relationship Management (CRM for short) System emerged in the last decade to reflect the central role of the customer for the strategic positioning of a company. One of the most significant changes in the practi...
WWDC SERVER SOFTWARE INVENTORY MANAGEMENT AND AUTOMATION
Many organizations maintain a large Data Centre for its business operation. In that different administration team works on large set of servers and performs several tasks on need basis. It’s too complicate to handle this...
A new shape descriptor using XML language
In this paper we present a new method for writing an approximate description of 2D/3D objects in text form using XML language. First, the outline of the shape is divided into parts according to N angular and M radial sec...