Rapid and Proactive Approach on Exploration of Database Vulnerabilities
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 2
Abstract
In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system resources like the databases and the operating systems from the attacks of the unknown outsiders. Our approach plays a major role in detecting and managing vulnerabilities in complex computing systems. It allows enterprises to assess two primary tiers through a single interface as a vulnerability scanner tool which provides a secure system which is also compatible with the security compliance of the industry. It provides an overall view of the vulnerabilities in the database, by automatically scanning them with minimum overhead. It gives a detailed view of the risks involved and their corresponding ratings. Based on these priorities, an appropriate mitigation process can be implemented to ensure a secured system. The results show that our approach could effectively optimize the time and cost involved when compared to the existing systems.
Authors and Affiliations
A. Ramachandran , S. Ramachandran
Secured, Authenticated Communication Model for Dynamic Multicast Groups
Secure Multicast networks forms the backbone for many web and multimedia applications such as Interactive TV, Teleconference etc. The main challenge for secure multicast is scalability, efficiency and authenticity. A co...
An Efficient Coverage for Sensor Deployments in Wireless Sensor Network
The Wireless sensor networks constitute the environment of a broad range of applications related to national security, surveillance, military, health care, and environmental monitoring. The coverage of Wireless Sensor Ne...
Efficient rough sets based dynamic Agglomerative clustering
There are different types of techiniques are there to extract knowledge from various sources. Critical / rough set has been applied to extract knowledge from various types of databases. Some limitations have been discove...
A Comprehensive Assessment of Object-Oriented Software Systems Using Metrics Approach
Demand for efficient software is increasing day by day and bject-oriented design technique became able to fulfill this demand because it is the most powerful mechanism to develop efficient software systems. It can not o...
A NEW APPROACH FOR VARIANT MULTI ASSIGNMENT PROBLEM
A large number of real-world planning problems called Combinatorial Optimization Problems share the following properties: They are Optimization Problems, are easy to state, and have a finite but usually very large number...