dc.contributor.author |
Ramachandran, A |
|
dc.contributor.author |
Ramachandran, S |
|
dc.date.accessioned |
2014-07-19T06:53:37Z |
|
dc.date.available |
2014-07-19T06:53:37Z |
|
dc.date.issued |
2012-02-02 |
|
dc.identifier.issn |
0975-3397 |
|
dc.identifier.uri |
http://dyuthi.cusat.ac.in/purl/4126 |
|
dc.description |
International Journal on Computer Science and Engineering (IJCSE)Vol. 4 No. 02 February 2012 |
en_US |
dc.description.abstract |
In today's complicated computing environment, managing data has become the primary concern
of all industries. Information security is the greatest challenge and it has become essential to secure the
enterprise system resources like the databases and the operating systems from the attacks of the unknown
outsiders. Our approach plays a major role in detecting and managing vulnerabilities in complex
computing systems. It allows enterprises to assess two primary tiers through a single interface as a
vulnerability scanner tool which provides a secure system which is also compatible with the security
compliance of the industry. It provides an overall view of the vulnerabilities in the database, by
automatically scanning them with minimum overhead. It gives a detailed view of the risks involved and
their corresponding ratings. Based on these priorities, an appropriate mitigation process can be
implemented to ensure a secured system. The results show that our approach could effectively optimize
the time and cost involved when compared to the existing systems |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Engg Journals Publications |
en_US |
dc.subject |
software engineering |
en_US |
dc.subject |
fault injection |
en_US |
dc.subject |
attack injection |
en_US |
dc.subject |
vulnerability assessment |
en_US |
dc.title |
Rapid and Proactive Approach on Exploration of Database Vulnerabilities |
en_US |
dc.type |
Article |
en_US |