ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Modular responsibility distribution for vulnerability management process

Journal: International Journal of Advanced Technology and Engineering Exploration (IJATEE) (Vol.5, No. 48)

Publication Date:

Authors : ; ;

Page : 469-472

Keywords : Cloud security; Vulnerability; Vulnerability management.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The world of computing rapidly changed from mainframe to client server architecture and towards the new world of cloud computing. This new generation of computing has tremendous advantages over traditional offerings. Irrespective of all, security is one of the biggest hurdles which hold the migration of business towards cloud. Main reason is client unawareness about the security counters and their roles. Security control can be normally implemented around three levels such as vulnerability, attack and threat. It is better to identify and pre analyse the concerns at earliest level. The purpose of research is to visualize the vulnerability management process in the modular form and make a transparent responsibility picture for each actor. In the end of the research a new term threshold limit was highlighted in vulnerability life cycle.

Last modified: 2019-01-07 22:52:32