Rapid and Proactive Approach on Exploration of Database Vulnerabilities
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 2
Abstract
In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system resources like the databases and the operating systems from the attacks of the unknown outsiders. Our approach plays a major role in detecting and managing vulnerabilities in complex computing systems. It allows enterprises to assess two primary tiers through a single interface as a vulnerability scanner tool which provides a secure system which is also compatible with the security compliance of the industry. It provides an overall view of the vulnerabilities in the database, by automatically scanning them with minimum overhead. It gives a detailed view of the risks involved and their corresponding ratings. Based on these priorities, an appropriate mitigation process can be implemented to ensure a secured system. The results show that our approach could effectively optimize the time and cost involved when compared to the existing systems.
Authors and Affiliations
A. Ramachandran , S. Ramachandran
A Framework For Extracting Information From Web Using VTD-XML‘s XPath
The exponential growth of WWW (World Wide Web) is the cause for vast pool of information as well as several challenges posed by it, such as extracting potentially useful and unknown information from WWW. Many websites ar...
Prediction of Profitability of Industries using Weighted SVR
In order to measure the profitability of an industry by predicting Pre-Tax Operating Margin by applying regression technique on Price/Sales Ratio and Net Margin of various industries. Prediction of Pre-Tax Operating Marg...
Multimodal Authentication For High End Security
In earlier days Traditional authentication method in computer systems are based on knowledge and token based. Unfortunately lot of drawbacks are in these systems. Passwords often be forgotten, disclosed or changed. A rel...
Power Control Technique for Efficient Call Admission Control in Advanced Wirless Networks
In 4G networks, call admission control techniques have been proposed to provide Quality of Service (QoS) in a network by restricting the access to network resources. Power control is essential in call admission control i...
Secure Transmission of Compound Information Using Image Steganography
The security of information handled in real time transmission reception like internet is of paramount consideration, as this information may be confidential. And also, the parameter in concern nowa- days is size as it ma...