SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2637
Vulnerability Management in IT Infrastructure
Raghav Taori1, Jali Rohan2, Raghavendra Prasad SG3, Dr. K.B. Ramesh4, Suryanarayana Vijay5
1,3 Department of Information Science and Engineering, R V College of Engineering, Bangalore, India
2,4 Department of Electronics and Instrumentation Engineering, R V College of Engineering, Bangalore, India
5Hewlett Packard Enterprise
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – In today's world, cyber security is a major
concern, and its risks can have far-reaching effects for
organizations. The newspaper headlines are dominated by
stories about data breaches, for instance. The company
suffers from lowered trust levels, and itsrevenuesuffersasa
result. Therefore, it is important to comply with security
policies. At present, security management processes are
manual and need some intelligence and automation. A
vulnerability report can be generated in several formats,
such as XML, Excel, or CSV. We aim to make the critical
infrastructure of the organization cyber-secure and
automate the manual process of identifying mission critical
assets, threat surfaces, vulnerabilities, and remediation
procedures. Our solution was to create a web portal that
allows asset owners to log in and see all their assets with
vulnerabilities, which can then be remediedaccordingto the
solutions provided by the security lead. A web portal was
developed using MONGO DB, NODE JS, EXPRESS JS, and
REACT JS, so that the user could access the reports from the
NOSQL database in an organized way.Besidesdata analytics,
mail escalation, and false positive detection, other features
have been implemented as well. Data centers, research labs,
and other locations are included in the scope of this project.
Assets such as crash & burn and other assets that are not
mission-critical are not included in the product.
Key Words: Cybersecurity, Security Management,
Vulnerability assessment, cyber-security compliant,
Mission critical assets, React JS, Node JS, MongoDB, Web
Application, MERN Stack
1. INTRODUCTION
A vulnerability is a weakness in a system that allows threats
to compromise assets. It is inevitable that all systems will
have vulnerabilities. Vulnerability assessmentshelpidentify
vulnerabilities using vulnerability scans. Performing a
vulnerability assessment on a system is a systematic way of
identifying its vulnerabilities and weaknesses aheadoftime.
Identifying loopholes ahead of time through vulnerability
assessments allows any organization to safeguard itself
against cyberattacks. We can obtain vulnerability alert
reports from tools such as Tenable, Qualys, etc. In order to
remedy these vulnerabilities, these reports are currently
being analyzed manually, and emails are being sent to the
asset owners. The security lead has a tough time
determining whetherthevulnerabilitieshavebeenremedied
or not, and whether a false-positive will occur next time
around. We came up with a solution to make the task of
remediating these vulnerabilities to closure more effective,
efficient, and transparent for Security Admins,Infra Admins,
and Asset Owners. Vulnerability reports will mainly contain
the following information:
 Vulnerability name
 IP address
 CVSS or Severity
 Scan date
It is possible to generate vulnerability reports in a variety of
formats, such as XML, Excel, or CSV. Our primary objectiveis
to make mission-critical assetscyber-securitycompliantand
automate the manual tasks of identifying mission-critical
assets, threat surfaces, and resolving vulnerabilities.
1.1 LITERATURE SURVEY
Comparative study of some applications made in the
Vue.js and React.js frameworks [1]. There has been a
significant increase in demand for these technologies stacks
due to the growing desire for faster systems that are better
than the traditional systems. Several JavaScript frameworks
are available that have features such as popularity, ease of
use, and integration with different technologies.ReactJSand
VueJS are compared clearly in termsoftheabove-mentioned
features as well as others.
Performance comparison and evaluation of Node.js and
traditional web server (IIS) [2]. An analysis of discrete
choice models' estimationprocesshasbeenpresentedby the
author. In the publication, Maximum Likelihood Estimation
is described. Due to this, users can estimate many models,
including multinomial logit, hybrid models, and others.
Moreover, by employing a high number of iterations, the
approach aims to eliminate any biases or inclinations that
may exist in the model and produces equal weighted
answers.
Research and Application of Node.js Core Technology
[3]. Early on in the development of a network, various
technologies were employed for front-end and back-end
development. With the debut of node.js, the development of
the website has undergone enormouschanges.Aserver-side
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2638
programming platform called node.js was created based on
the Chrome V8 engine JavaScript runtime environment, in
contrast with single-threaded PHP and multi-threaded Java.
By utilizing its own built-in and defined properties, Node.js
compensates for the limitations of the background
development language. A server-side JavaScript interpreter
is used to build rapid and easy-to-use web applications.
There are several functions that Node.js can perform that
Core JavaScript cannot, such as file systems, modules,
packages, and operating system APIs, In this study, we
compare the performance of MongoDB to MySQL by
examining insertion and retrieval operations using a
web/android applicationto exploreshardingandits benefits
in MongoDB [4]. Information gathered from multiple input
and output sources can be used to build certain
infrastructures, but if not handled properly, it can also be
prone to damage, which could result in data loss. In order to
overcome such loss, the NoSQL MongoDBisoneexample ofa
parallel strategy being used. The auto-sharding feature of
Mongo DB makes it a differentiating cross-platform,
document-oriented database that ensures optimal data
management and excellent performance. As the database is
sharded over several servers, capacity and scalability are
increased.
Challenges faced today by computer security
practitioners [5]. The report stated that computer security
practitioners still have difficulty convincing management
that these issues are important, as well as educating
management and users, getting othersecurityprofessionals'
cooperation, and using the available security technology.
Safe Client/Server Web Development with Haskell [6].A
robust and comprehensive web development framework
based on Reflex-Dom and Servant, two Haskell libraries, is
shown to make use of type checking to ensure various
security and correctness features. We can guide them by
using types to ensure our API gets the right data.
Data Integrity: Recovering from RansomwareandOther
Destructive Events [7]. To assist businessesinensuringthe
integrity of their data, The National Cybersecurity Center of
Excellence (NCCoE) works in partnership with businesses
and the information technology community (IT). Several
breaches of data integrity have exposed company data,
including emails, personnel files, financial information, and
consumer data.
Cyber Security Based on Artificial IntelligenceforCyber-
Physical Systems [8]. Analyzed how systems have become
more complex, intelligent, and autonomous as they have
grown more sophisticated and complicated. A variety of
cyber and physical components interact with each other in
extremely complex ways. As a result of their extreme
complexity, they are susceptibletosignificantperturbations.
2. METHODOLOGY
By developing a web portal where users can login and view
Vulnerability reports and take the necessary actions, wecan
overcome the manual process of analyzing Vulnerability
reports. As a result, the entire life cycle of Risk Treatment
could be made more efficient and faster. The process of
identifying false positives and raising exceptions becomes
simpler and more efficient.
Fig 1. Proposed Software Architecture
3. RESULTS AND DISCUSSIONS
With the help of a portal, we have built a process for
automating the process of cyber-security management and
displaying vulnerability scan reports in a more structured
way. We developed different user interfaces for different
personas. Personae are mainly divided into two types:
1. Security Lead
2. Asset Owner
Our scanning tool produces a report which we store into a
MongoDB collection once we receive its results. It mainly
contains all the vulnerabilities associated with a specific
infrastructure. Each vulnerability is then enhanced with
some additional fields. There are a number of important
fields, including Risk Treatment, Mitigation Status, and
Remediation Target Date. Vulnerability Risk Treatmentsare
initially not set for particular vulnerabilities. All
vulnerabilities will be visible to the Security Lead once
he/she logs in. Depending on the security lead's decision,
Risk Treatment can either be mitigated or accepted. In the
case of a Mitigate Risk Treatment, the Security Lead must
specify a Remediation Target Date. When the Asset Owner
logs in, he/she can view all assets belonging to their
Infrastructure that have been assigned a Risk Treatment of
Mitigate by the Security Lead. It is the asset owner's
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2639
responsibility to remediate his/her assets before the
remediation deadline. In order to remediate their assets,the
Asset owner could follow the remediation steps providedby
the Security Lead. As soon as the Asset Owner remediates
the assets, the mitigation status must be updated from
Pending to Completed. A status update made by an Asset
owner is reflected in Security Lead's UI as well.
Fig 2. Security lead & Asset owner View
In the event that the owner is unable to resolve the issue by
the target date, an email will be sent to his/her manager.
Asset owners can also requestanexceptionfor extending the
remediation target date by providing valid business
justifications. This exception will be notified to the Security
lead. As long as the Security lead accepts the exception, the
Remediation target date will be updated as requestedbythe
Asset owner.
Fig 3. Security lead & Asset owner View
Time frame for remediation, escalation matrix and SLAs are
determined by criticality of vulnerability and criticality of
asset. In the UI, there are two types of views - Unique
Vulnerabilities and All Assets. Using the Unique
Vulnerabilities view, we are able to view all the assets that
are affected by a particular vulnerability. Additionally,when
we click on an asset in the assets-based view, we will be able
to see all the vulnerabilities associated with that asset.
Detection of false positives has also been implemented.
4. CONCLUSION
Unlike crash-and-burn projects, this project focuses on
protecting mission-critical assets only. It is possible to
migrate the project to a cloudplatform suchas AWS. Inorder
to detect vulnerabilities more effectively, more databases
could be used for vulnerability checks.
REFERENCES
[1] C. M. Novac, O. C. Novac, R. M. Sferle, M. I. Gordan, G.
BUJDOSó and C. M. Dindelegan, "Comparative study of some
applications made in the Vue.js and React.js frameworks,"
2021 16th International Conference on Engineering of
Modern Electric Systems (EMES), 2021, pp. 1-4, doi:
10.1109/EMES52337.2021.9484149.
[2] L. P. Chitra and R. Satapathy, "Performance comparison
and evaluation of Node.js and traditional web server (IIS),"
2017 International Conference on Algorithms,Methodology,
Models and Applications in Emerging Technologies
(ICAMMAET), 2017, pp. 1-4, doi:
10.1109/ICAMMAET.2017.8186633.
[3] X. Huang, "Research and Application of Node.js Core
Technology," 2020 International Conference on Intelligent
Computing and Human-ComputerInteraction(ICHCI),2020,
pp. 1-4, doi: 10.1109/ICHCI51889.2020.00008.
[4] L. F. Reese, "Challenges faced today by computersecurity
practitioners," [1989 Proceedings] Fifth Annual Computer
Security Applications Conference, 1989, pp. 143-, doi:
10.1109/CSAC.1989.81044.
[5] R. A. Kemmerer, "Cybersecurity," 25th International
Conference on Software Engineering, 2003. Proceedings.,
2003, pp. 705-715, doi: 10.1109/ICSE.2003.1201257
[6]H. Sedjelmaci, F. Guenab, S. -M. Senouci, H.Moustafa,J.Liu
and S. Han, "Cyber Security Based on Artificial Intelligence
for Cyber-Physical Systems," in IEEE Network, vol. 34, no. 3,
pp. 6-7, May/June 2020, doi: 10.1109/MNET.2020.9105926
[7] T. McBride, A. Townsend, M. Ekstrom, L. Lusty and J.
Sexton, "Data Integrity: Recovering from Ransomware and
Other Destructive Events," 2018 IEEE Cybersecurity
Development (SecDev), 2018, pp. 140-140, doi:
10.1109/SecDev.2018.00036
[8]M. Mazumder and T. Braje, "Safe Client/Server Web
Development with Haskell," 2019 IEEE Cybersecurity
Development (SecDev), 2019, pp. 150-150, doi:
10.1109/SecDev.2019.040.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2640
[9] Y. Hong and X. Shao, " Analysis of CyberSecurity Product
Reviews Based on MachineLearning", 20213rdInternational
Conference on Applied Machine Learning (ICAML), pp. 398-
401, 2021.

More Related Content

Similar to Vulnerability management portal automates process

Developing microservices with Java and applying Spring security framework and...
Developing microservices with Java and applying Spring security framework and...Developing microservices with Java and applying Spring security framework and...
Developing microservices with Java and applying Spring security framework and...IRJET Journal
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET Journal
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...IRJET Journal
 
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET Journal
 
Rational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentRational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentVESIT/University of Mumbai
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET Journal
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing SuiteIRJET Journal
 
Design and Monitoring Performance of Digital Properties
Design and Monitoring Performance of Digital PropertiesDesign and Monitoring Performance of Digital Properties
Design and Monitoring Performance of Digital PropertiesIRJET Journal
 
Analyzing Optimal Practises for Web Frameworks
Analyzing Optimal Practises for Web FrameworksAnalyzing Optimal Practises for Web Frameworks
Analyzing Optimal Practises for Web FrameworksIRJET Journal
 
Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsReliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsCSEIJJournal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.IRJET Journal
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.IRJET Journal
 
Clone of an organization
Clone of an organizationClone of an organization
Clone of an organizationIRJET Journal
 
Routine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence FlawsRoutine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence FlawsIJTET Journal
 
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...IRJET Journal
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 

Similar to Vulnerability management portal automates process (20)

Developing microservices with Java and applying Spring security framework and...
Developing microservices with Java and applying Spring security framework and...Developing microservices with Java and applying Spring security framework and...
Developing microservices with Java and applying Spring security framework and...
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
 
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software Design
 
Rational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentRational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability Assessment
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
Design and Monitoring Performance of Digital Properties
Design and Monitoring Performance of Digital PropertiesDesign and Monitoring Performance of Digital Properties
Design and Monitoring Performance of Digital Properties
 
Analyzing Optimal Practises for Web Frameworks
Analyzing Optimal Practises for Web FrameworksAnalyzing Optimal Practises for Web Frameworks
Analyzing Optimal Practises for Web Frameworks
 
Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsReliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software Applications
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.
 
Clone of an organization
Clone of an organizationClone of an organization
Clone of an organization
 
Routine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence FlawsRoutine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence Flaws
 
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Recently uploaded (20)

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

Vulnerability management portal automates process

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2637 Vulnerability Management in IT Infrastructure Raghav Taori1, Jali Rohan2, Raghavendra Prasad SG3, Dr. K.B. Ramesh4, Suryanarayana Vijay5 1,3 Department of Information Science and Engineering, R V College of Engineering, Bangalore, India 2,4 Department of Electronics and Instrumentation Engineering, R V College of Engineering, Bangalore, India 5Hewlett Packard Enterprise ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – In today's world, cyber security is a major concern, and its risks can have far-reaching effects for organizations. The newspaper headlines are dominated by stories about data breaches, for instance. The company suffers from lowered trust levels, and itsrevenuesuffersasa result. Therefore, it is important to comply with security policies. At present, security management processes are manual and need some intelligence and automation. A vulnerability report can be generated in several formats, such as XML, Excel, or CSV. We aim to make the critical infrastructure of the organization cyber-secure and automate the manual process of identifying mission critical assets, threat surfaces, vulnerabilities, and remediation procedures. Our solution was to create a web portal that allows asset owners to log in and see all their assets with vulnerabilities, which can then be remediedaccordingto the solutions provided by the security lead. A web portal was developed using MONGO DB, NODE JS, EXPRESS JS, and REACT JS, so that the user could access the reports from the NOSQL database in an organized way.Besidesdata analytics, mail escalation, and false positive detection, other features have been implemented as well. Data centers, research labs, and other locations are included in the scope of this project. Assets such as crash & burn and other assets that are not mission-critical are not included in the product. Key Words: Cybersecurity, Security Management, Vulnerability assessment, cyber-security compliant, Mission critical assets, React JS, Node JS, MongoDB, Web Application, MERN Stack 1. INTRODUCTION A vulnerability is a weakness in a system that allows threats to compromise assets. It is inevitable that all systems will have vulnerabilities. Vulnerability assessmentshelpidentify vulnerabilities using vulnerability scans. Performing a vulnerability assessment on a system is a systematic way of identifying its vulnerabilities and weaknesses aheadoftime. Identifying loopholes ahead of time through vulnerability assessments allows any organization to safeguard itself against cyberattacks. We can obtain vulnerability alert reports from tools such as Tenable, Qualys, etc. In order to remedy these vulnerabilities, these reports are currently being analyzed manually, and emails are being sent to the asset owners. The security lead has a tough time determining whetherthevulnerabilitieshavebeenremedied or not, and whether a false-positive will occur next time around. We came up with a solution to make the task of remediating these vulnerabilities to closure more effective, efficient, and transparent for Security Admins,Infra Admins, and Asset Owners. Vulnerability reports will mainly contain the following information:  Vulnerability name  IP address  CVSS or Severity  Scan date It is possible to generate vulnerability reports in a variety of formats, such as XML, Excel, or CSV. Our primary objectiveis to make mission-critical assetscyber-securitycompliantand automate the manual tasks of identifying mission-critical assets, threat surfaces, and resolving vulnerabilities. 1.1 LITERATURE SURVEY Comparative study of some applications made in the Vue.js and React.js frameworks [1]. There has been a significant increase in demand for these technologies stacks due to the growing desire for faster systems that are better than the traditional systems. Several JavaScript frameworks are available that have features such as popularity, ease of use, and integration with different technologies.ReactJSand VueJS are compared clearly in termsoftheabove-mentioned features as well as others. Performance comparison and evaluation of Node.js and traditional web server (IIS) [2]. An analysis of discrete choice models' estimationprocesshasbeenpresentedby the author. In the publication, Maximum Likelihood Estimation is described. Due to this, users can estimate many models, including multinomial logit, hybrid models, and others. Moreover, by employing a high number of iterations, the approach aims to eliminate any biases or inclinations that may exist in the model and produces equal weighted answers. Research and Application of Node.js Core Technology [3]. Early on in the development of a network, various technologies were employed for front-end and back-end development. With the debut of node.js, the development of the website has undergone enormouschanges.Aserver-side
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2638 programming platform called node.js was created based on the Chrome V8 engine JavaScript runtime environment, in contrast with single-threaded PHP and multi-threaded Java. By utilizing its own built-in and defined properties, Node.js compensates for the limitations of the background development language. A server-side JavaScript interpreter is used to build rapid and easy-to-use web applications. There are several functions that Node.js can perform that Core JavaScript cannot, such as file systems, modules, packages, and operating system APIs, In this study, we compare the performance of MongoDB to MySQL by examining insertion and retrieval operations using a web/android applicationto exploreshardingandits benefits in MongoDB [4]. Information gathered from multiple input and output sources can be used to build certain infrastructures, but if not handled properly, it can also be prone to damage, which could result in data loss. In order to overcome such loss, the NoSQL MongoDBisoneexample ofa parallel strategy being used. The auto-sharding feature of Mongo DB makes it a differentiating cross-platform, document-oriented database that ensures optimal data management and excellent performance. As the database is sharded over several servers, capacity and scalability are increased. Challenges faced today by computer security practitioners [5]. The report stated that computer security practitioners still have difficulty convincing management that these issues are important, as well as educating management and users, getting othersecurityprofessionals' cooperation, and using the available security technology. Safe Client/Server Web Development with Haskell [6].A robust and comprehensive web development framework based on Reflex-Dom and Servant, two Haskell libraries, is shown to make use of type checking to ensure various security and correctness features. We can guide them by using types to ensure our API gets the right data. Data Integrity: Recovering from RansomwareandOther Destructive Events [7]. To assist businessesinensuringthe integrity of their data, The National Cybersecurity Center of Excellence (NCCoE) works in partnership with businesses and the information technology community (IT). Several breaches of data integrity have exposed company data, including emails, personnel files, financial information, and consumer data. Cyber Security Based on Artificial IntelligenceforCyber- Physical Systems [8]. Analyzed how systems have become more complex, intelligent, and autonomous as they have grown more sophisticated and complicated. A variety of cyber and physical components interact with each other in extremely complex ways. As a result of their extreme complexity, they are susceptibletosignificantperturbations. 2. METHODOLOGY By developing a web portal where users can login and view Vulnerability reports and take the necessary actions, wecan overcome the manual process of analyzing Vulnerability reports. As a result, the entire life cycle of Risk Treatment could be made more efficient and faster. The process of identifying false positives and raising exceptions becomes simpler and more efficient. Fig 1. Proposed Software Architecture 3. RESULTS AND DISCUSSIONS With the help of a portal, we have built a process for automating the process of cyber-security management and displaying vulnerability scan reports in a more structured way. We developed different user interfaces for different personas. Personae are mainly divided into two types: 1. Security Lead 2. Asset Owner Our scanning tool produces a report which we store into a MongoDB collection once we receive its results. It mainly contains all the vulnerabilities associated with a specific infrastructure. Each vulnerability is then enhanced with some additional fields. There are a number of important fields, including Risk Treatment, Mitigation Status, and Remediation Target Date. Vulnerability Risk Treatmentsare initially not set for particular vulnerabilities. All vulnerabilities will be visible to the Security Lead once he/she logs in. Depending on the security lead's decision, Risk Treatment can either be mitigated or accepted. In the case of a Mitigate Risk Treatment, the Security Lead must specify a Remediation Target Date. When the Asset Owner logs in, he/she can view all assets belonging to their Infrastructure that have been assigned a Risk Treatment of Mitigate by the Security Lead. It is the asset owner's
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2639 responsibility to remediate his/her assets before the remediation deadline. In order to remediate their assets,the Asset owner could follow the remediation steps providedby the Security Lead. As soon as the Asset Owner remediates the assets, the mitigation status must be updated from Pending to Completed. A status update made by an Asset owner is reflected in Security Lead's UI as well. Fig 2. Security lead & Asset owner View In the event that the owner is unable to resolve the issue by the target date, an email will be sent to his/her manager. Asset owners can also requestanexceptionfor extending the remediation target date by providing valid business justifications. This exception will be notified to the Security lead. As long as the Security lead accepts the exception, the Remediation target date will be updated as requestedbythe Asset owner. Fig 3. Security lead & Asset owner View Time frame for remediation, escalation matrix and SLAs are determined by criticality of vulnerability and criticality of asset. In the UI, there are two types of views - Unique Vulnerabilities and All Assets. Using the Unique Vulnerabilities view, we are able to view all the assets that are affected by a particular vulnerability. Additionally,when we click on an asset in the assets-based view, we will be able to see all the vulnerabilities associated with that asset. Detection of false positives has also been implemented. 4. CONCLUSION Unlike crash-and-burn projects, this project focuses on protecting mission-critical assets only. It is possible to migrate the project to a cloudplatform suchas AWS. Inorder to detect vulnerabilities more effectively, more databases could be used for vulnerability checks. REFERENCES [1] C. M. Novac, O. C. Novac, R. M. Sferle, M. I. Gordan, G. BUJDOSó and C. M. Dindelegan, "Comparative study of some applications made in the Vue.js and React.js frameworks," 2021 16th International Conference on Engineering of Modern Electric Systems (EMES), 2021, pp. 1-4, doi: 10.1109/EMES52337.2021.9484149. [2] L. P. Chitra and R. Satapathy, "Performance comparison and evaluation of Node.js and traditional web server (IIS)," 2017 International Conference on Algorithms,Methodology, Models and Applications in Emerging Technologies (ICAMMAET), 2017, pp. 1-4, doi: 10.1109/ICAMMAET.2017.8186633. [3] X. Huang, "Research and Application of Node.js Core Technology," 2020 International Conference on Intelligent Computing and Human-ComputerInteraction(ICHCI),2020, pp. 1-4, doi: 10.1109/ICHCI51889.2020.00008. [4] L. F. Reese, "Challenges faced today by computersecurity practitioners," [1989 Proceedings] Fifth Annual Computer Security Applications Conference, 1989, pp. 143-, doi: 10.1109/CSAC.1989.81044. [5] R. A. Kemmerer, "Cybersecurity," 25th International Conference on Software Engineering, 2003. Proceedings., 2003, pp. 705-715, doi: 10.1109/ICSE.2003.1201257 [6]H. Sedjelmaci, F. Guenab, S. -M. Senouci, H.Moustafa,J.Liu and S. Han, "Cyber Security Based on Artificial Intelligence for Cyber-Physical Systems," in IEEE Network, vol. 34, no. 3, pp. 6-7, May/June 2020, doi: 10.1109/MNET.2020.9105926 [7] T. McBride, A. Townsend, M. Ekstrom, L. Lusty and J. Sexton, "Data Integrity: Recovering from Ransomware and Other Destructive Events," 2018 IEEE Cybersecurity Development (SecDev), 2018, pp. 140-140, doi: 10.1109/SecDev.2018.00036 [8]M. Mazumder and T. Braje, "Safe Client/Server Web Development with Haskell," 2019 IEEE Cybersecurity Development (SecDev), 2019, pp. 150-150, doi: 10.1109/SecDev.2019.040.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2640 [9] Y. Hong and X. Shao, " Analysis of CyberSecurity Product Reviews Based on MachineLearning", 20213rdInternational Conference on Applied Machine Learning (ICAML), pp. 398- 401, 2021.