Modular responsibility distribution for vulnerability management process
Journal: International Journal of Advanced Technology and Engineering Exploration (IJATEE) (Vol.5, No. 48)Publication Date: 2018-11-08
Authors : Shaz Alam; Mohd Muqeem;
Page : 469-472
Keywords : Cloud security; Vulnerability; Vulnerability management.;
Abstract
The world of computing rapidly changed from mainframe to client server architecture and towards the new world of cloud computing. This new generation of computing has tremendous advantages over traditional offerings. Irrespective of all, security is one of the biggest hurdles which hold the migration of business towards cloud. Main reason is client unawareness about the security counters and their roles. Security control can be normally implemented around three levels such as vulnerability, attack and threat. It is better to identify and pre analyse the concerns at earliest level. The purpose of research is to visualize the vulnerability management process in the modular form and make a transparent responsibility picture for each actor. In the end of the research a new term threshold limit was highlighted in vulnerability life cycle.
Other Latest Articles
- Harnessing supremacy of big data using hadoop for healthy human survival making use of bioinformatics
- Heart arrhythmia detection using labview GUI based approach
- Data delivery techniques in content centric routing for IoT: a systematic review
- Perioperative hyperglycemia and postoperative periprosthetic joint infection (PJI) after total knee and hip arthroplasty
- Femoral cartilage thickness in patients with systemic sclerosis: It’s relation to vitamin D
Last modified: 2019-01-07 22:52:32