Academic Journals Database
Disseminating quality controlled scientific knowledge

Rapid and Proactive Approach on Exploration of Database Vulnerabilities

ADD TO MY LIST
 
Author(s): A. Ramachandran | S. Ramachandran

Journal: International Journal on Computer Science and Engineering
ISSN 0975-3397

Volume: 4;
Issue: 2;
Start page: 224;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: software engineering | fault injection | attack injection | vulnerability assessment.

ABSTRACT
In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure theenterprise system resources like the databases and the operating systems from the attacks of the unknown outsiders. Our approach plays a major role in detecting and managing vulnerabilities in complexcomputing systems. It allows enterprises to assess two primary tiers through a single interface as a vulnerability scanner tool which provides a secure system which is also compatible with the securitycompliance of the industry. It provides an overall view of the vulnerabilities in the database, by automatically scanning them with minimum overhead. It gives a detailed view of the risks involved andtheir corresponding ratings. Based on these priorities, an appropriate mitigation process can be implemented to ensure a secured system. The results show that our approach could effectively optimizethe time and cost involved when compared to the existing systems.
Affiliate Program     

Tango Jona
Tangokurs Rapperswil-Jona