Submit Search
Upload
Vulnerability management portal automates process
•
0 likes
•
6 views
AI-enhanced title
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i7/IRJET-V9I7497.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
IRJET Journal
A Study on Vulnerability Management
A Study on Vulnerability Management
IRJET Journal
Vulnerability Management System
Vulnerability Management System
IRJET Journal
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
IRJET Journal
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
IRJET- Testing Web Application using Vulnerability Scan
IRJET- Testing Web Application using Vulnerability Scan
IRJET Journal
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspective
kalimullahmohd89
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspective
kalimullahmohd89
Recommended
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
IRJET Journal
A Study on Vulnerability Management
A Study on Vulnerability Management
IRJET Journal
Vulnerability Management System
Vulnerability Management System
IRJET Journal
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
IRJET Journal
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
IRJET- Testing Web Application using Vulnerability Scan
IRJET- Testing Web Application using Vulnerability Scan
IRJET Journal
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspective
kalimullahmohd89
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspective
kalimullahmohd89
Developing microservices with Java and applying Spring security framework and...
Developing microservices with Java and applying Spring security framework and...
IRJET Journal
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET Journal
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET Journal
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software Design
IRJET Journal
Rational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability Assessment
VESIT/University of Mumbai
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET Journal
www.ijerd.com
www.ijerd.com
IJERD Editor
IRJET- Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
IRJET Journal
Design and Monitoring Performance of Digital Properties
Design and Monitoring Performance of Digital Properties
IRJET Journal
Analyzing Optimal Practises for Web Frameworks
Analyzing Optimal Practises for Web Frameworks
IRJET Journal
Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software Applications
CSEIJJournal
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET Journal
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.
IRJET Journal
Clone of an organization
Clone of an organization
IRJET Journal
Routine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence Flaws
IJTET Journal
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
IRJET Journal
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Vulnerability management portal automates process
Developing microservices with Java and applying Spring security framework and...
Developing microservices with Java and applying Spring security framework and...
IRJET Journal
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET Journal
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET Journal
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software Design
IRJET Journal
Rational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability Assessment
VESIT/University of Mumbai
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET Journal
www.ijerd.com
www.ijerd.com
IJERD Editor
IRJET- Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
IRJET Journal
Design and Monitoring Performance of Digital Properties
Design and Monitoring Performance of Digital Properties
IRJET Journal
Analyzing Optimal Practises for Web Frameworks
Analyzing Optimal Practises for Web Frameworks
IRJET Journal
Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software Applications
CSEIJJournal
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET Journal
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.
IRJET Journal
Clone of an organization
Clone of an organization
IRJET Journal
Routine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence Flaws
IJTET Journal
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
IRJET Journal
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
Similar to Vulnerability management portal automates process
(20)
Developing microservices with Java and applying Spring security framework and...
Developing microservices with Java and applying Spring security framework and...
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software Design
Rational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability Assessment
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
www.ijerd.com
www.ijerd.com
IRJET- Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
Design and Monitoring Performance of Digital Properties
Design and Monitoring Performance of Digital Properties
Analyzing Optimal Practises for Web Frameworks
Analyzing Optimal Practises for Web Frameworks
Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software Applications
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.
Clone of an organization
Clone of an organization
Routine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence Flaws
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Recently uploaded
(20)
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Vulnerability management portal automates process
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2637 Vulnerability Management in IT Infrastructure Raghav Taori1, Jali Rohan2, Raghavendra Prasad SG3, Dr. K.B. Ramesh4, Suryanarayana Vijay5 1,3 Department of Information Science and Engineering, R V College of Engineering, Bangalore, India 2,4 Department of Electronics and Instrumentation Engineering, R V College of Engineering, Bangalore, India 5Hewlett Packard Enterprise ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – In today's world, cyber security is a major concern, and its risks can have far-reaching effects for organizations. The newspaper headlines are dominated by stories about data breaches, for instance. The company suffers from lowered trust levels, and itsrevenuesuffersasa result. Therefore, it is important to comply with security policies. At present, security management processes are manual and need some intelligence and automation. A vulnerability report can be generated in several formats, such as XML, Excel, or CSV. We aim to make the critical infrastructure of the organization cyber-secure and automate the manual process of identifying mission critical assets, threat surfaces, vulnerabilities, and remediation procedures. Our solution was to create a web portal that allows asset owners to log in and see all their assets with vulnerabilities, which can then be remediedaccordingto the solutions provided by the security lead. A web portal was developed using MONGO DB, NODE JS, EXPRESS JS, and REACT JS, so that the user could access the reports from the NOSQL database in an organized way.Besidesdata analytics, mail escalation, and false positive detection, other features have been implemented as well. Data centers, research labs, and other locations are included in the scope of this project. Assets such as crash & burn and other assets that are not mission-critical are not included in the product. Key Words: Cybersecurity, Security Management, Vulnerability assessment, cyber-security compliant, Mission critical assets, React JS, Node JS, MongoDB, Web Application, MERN Stack 1. INTRODUCTION A vulnerability is a weakness in a system that allows threats to compromise assets. It is inevitable that all systems will have vulnerabilities. Vulnerability assessmentshelpidentify vulnerabilities using vulnerability scans. Performing a vulnerability assessment on a system is a systematic way of identifying its vulnerabilities and weaknesses aheadoftime. Identifying loopholes ahead of time through vulnerability assessments allows any organization to safeguard itself against cyberattacks. We can obtain vulnerability alert reports from tools such as Tenable, Qualys, etc. In order to remedy these vulnerabilities, these reports are currently being analyzed manually, and emails are being sent to the asset owners. The security lead has a tough time determining whetherthevulnerabilitieshavebeenremedied or not, and whether a false-positive will occur next time around. We came up with a solution to make the task of remediating these vulnerabilities to closure more effective, efficient, and transparent for Security Admins,Infra Admins, and Asset Owners. Vulnerability reports will mainly contain the following information: Vulnerability name IP address CVSS or Severity Scan date It is possible to generate vulnerability reports in a variety of formats, such as XML, Excel, or CSV. Our primary objectiveis to make mission-critical assetscyber-securitycompliantand automate the manual tasks of identifying mission-critical assets, threat surfaces, and resolving vulnerabilities. 1.1 LITERATURE SURVEY Comparative study of some applications made in the Vue.js and React.js frameworks [1]. There has been a significant increase in demand for these technologies stacks due to the growing desire for faster systems that are better than the traditional systems. Several JavaScript frameworks are available that have features such as popularity, ease of use, and integration with different technologies.ReactJSand VueJS are compared clearly in termsoftheabove-mentioned features as well as others. Performance comparison and evaluation of Node.js and traditional web server (IIS) [2]. An analysis of discrete choice models' estimationprocesshasbeenpresentedby the author. In the publication, Maximum Likelihood Estimation is described. Due to this, users can estimate many models, including multinomial logit, hybrid models, and others. Moreover, by employing a high number of iterations, the approach aims to eliminate any biases or inclinations that may exist in the model and produces equal weighted answers. Research and Application of Node.js Core Technology [3]. Early on in the development of a network, various technologies were employed for front-end and back-end development. With the debut of node.js, the development of the website has undergone enormouschanges.Aserver-side
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2638 programming platform called node.js was created based on the Chrome V8 engine JavaScript runtime environment, in contrast with single-threaded PHP and multi-threaded Java. By utilizing its own built-in and defined properties, Node.js compensates for the limitations of the background development language. A server-side JavaScript interpreter is used to build rapid and easy-to-use web applications. There are several functions that Node.js can perform that Core JavaScript cannot, such as file systems, modules, packages, and operating system APIs, In this study, we compare the performance of MongoDB to MySQL by examining insertion and retrieval operations using a web/android applicationto exploreshardingandits benefits in MongoDB [4]. Information gathered from multiple input and output sources can be used to build certain infrastructures, but if not handled properly, it can also be prone to damage, which could result in data loss. In order to overcome such loss, the NoSQL MongoDBisoneexample ofa parallel strategy being used. The auto-sharding feature of Mongo DB makes it a differentiating cross-platform, document-oriented database that ensures optimal data management and excellent performance. As the database is sharded over several servers, capacity and scalability are increased. Challenges faced today by computer security practitioners [5]. The report stated that computer security practitioners still have difficulty convincing management that these issues are important, as well as educating management and users, getting othersecurityprofessionals' cooperation, and using the available security technology. Safe Client/Server Web Development with Haskell [6].A robust and comprehensive web development framework based on Reflex-Dom and Servant, two Haskell libraries, is shown to make use of type checking to ensure various security and correctness features. We can guide them by using types to ensure our API gets the right data. Data Integrity: Recovering from RansomwareandOther Destructive Events [7]. To assist businessesinensuringthe integrity of their data, The National Cybersecurity Center of Excellence (NCCoE) works in partnership with businesses and the information technology community (IT). Several breaches of data integrity have exposed company data, including emails, personnel files, financial information, and consumer data. Cyber Security Based on Artificial IntelligenceforCyber- Physical Systems [8]. Analyzed how systems have become more complex, intelligent, and autonomous as they have grown more sophisticated and complicated. A variety of cyber and physical components interact with each other in extremely complex ways. As a result of their extreme complexity, they are susceptibletosignificantperturbations. 2. METHODOLOGY By developing a web portal where users can login and view Vulnerability reports and take the necessary actions, wecan overcome the manual process of analyzing Vulnerability reports. As a result, the entire life cycle of Risk Treatment could be made more efficient and faster. The process of identifying false positives and raising exceptions becomes simpler and more efficient. Fig 1. Proposed Software Architecture 3. RESULTS AND DISCUSSIONS With the help of a portal, we have built a process for automating the process of cyber-security management and displaying vulnerability scan reports in a more structured way. We developed different user interfaces for different personas. Personae are mainly divided into two types: 1. Security Lead 2. Asset Owner Our scanning tool produces a report which we store into a MongoDB collection once we receive its results. It mainly contains all the vulnerabilities associated with a specific infrastructure. Each vulnerability is then enhanced with some additional fields. There are a number of important fields, including Risk Treatment, Mitigation Status, and Remediation Target Date. Vulnerability Risk Treatmentsare initially not set for particular vulnerabilities. All vulnerabilities will be visible to the Security Lead once he/she logs in. Depending on the security lead's decision, Risk Treatment can either be mitigated or accepted. In the case of a Mitigate Risk Treatment, the Security Lead must specify a Remediation Target Date. When the Asset Owner logs in, he/she can view all assets belonging to their Infrastructure that have been assigned a Risk Treatment of Mitigate by the Security Lead. It is the asset owner's
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2639 responsibility to remediate his/her assets before the remediation deadline. In order to remediate their assets,the Asset owner could follow the remediation steps providedby the Security Lead. As soon as the Asset Owner remediates the assets, the mitigation status must be updated from Pending to Completed. A status update made by an Asset owner is reflected in Security Lead's UI as well. Fig 2. Security lead & Asset owner View In the event that the owner is unable to resolve the issue by the target date, an email will be sent to his/her manager. Asset owners can also requestanexceptionfor extending the remediation target date by providing valid business justifications. This exception will be notified to the Security lead. As long as the Security lead accepts the exception, the Remediation target date will be updated as requestedbythe Asset owner. Fig 3. Security lead & Asset owner View Time frame for remediation, escalation matrix and SLAs are determined by criticality of vulnerability and criticality of asset. In the UI, there are two types of views - Unique Vulnerabilities and All Assets. Using the Unique Vulnerabilities view, we are able to view all the assets that are affected by a particular vulnerability. Additionally,when we click on an asset in the assets-based view, we will be able to see all the vulnerabilities associated with that asset. Detection of false positives has also been implemented. 4. CONCLUSION Unlike crash-and-burn projects, this project focuses on protecting mission-critical assets only. It is possible to migrate the project to a cloudplatform suchas AWS. Inorder to detect vulnerabilities more effectively, more databases could be used for vulnerability checks. REFERENCES [1] C. M. Novac, O. C. Novac, R. M. Sferle, M. I. Gordan, G. BUJDOSó and C. M. Dindelegan, "Comparative study of some applications made in the Vue.js and React.js frameworks," 2021 16th International Conference on Engineering of Modern Electric Systems (EMES), 2021, pp. 1-4, doi: 10.1109/EMES52337.2021.9484149. [2] L. P. Chitra and R. Satapathy, "Performance comparison and evaluation of Node.js and traditional web server (IIS)," 2017 International Conference on Algorithms,Methodology, Models and Applications in Emerging Technologies (ICAMMAET), 2017, pp. 1-4, doi: 10.1109/ICAMMAET.2017.8186633. [3] X. Huang, "Research and Application of Node.js Core Technology," 2020 International Conference on Intelligent Computing and Human-ComputerInteraction(ICHCI),2020, pp. 1-4, doi: 10.1109/ICHCI51889.2020.00008. [4] L. F. Reese, "Challenges faced today by computersecurity practitioners," [1989 Proceedings] Fifth Annual Computer Security Applications Conference, 1989, pp. 143-, doi: 10.1109/CSAC.1989.81044. [5] R. A. Kemmerer, "Cybersecurity," 25th International Conference on Software Engineering, 2003. Proceedings., 2003, pp. 705-715, doi: 10.1109/ICSE.2003.1201257 [6]H. Sedjelmaci, F. Guenab, S. -M. Senouci, H.Moustafa,J.Liu and S. Han, "Cyber Security Based on Artificial Intelligence for Cyber-Physical Systems," in IEEE Network, vol. 34, no. 3, pp. 6-7, May/June 2020, doi: 10.1109/MNET.2020.9105926 [7] T. McBride, A. Townsend, M. Ekstrom, L. Lusty and J. Sexton, "Data Integrity: Recovering from Ransomware and Other Destructive Events," 2018 IEEE Cybersecurity Development (SecDev), 2018, pp. 140-140, doi: 10.1109/SecDev.2018.00036 [8]M. Mazumder and T. Braje, "Safe Client/Server Web Development with Haskell," 2019 IEEE Cybersecurity Development (SecDev), 2019, pp. 150-150, doi: 10.1109/SecDev.2019.040.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2640 [9] Y. Hong and X. Shao, " Analysis of CyberSecurity Product Reviews Based on MachineLearning", 20213rdInternational Conference on Applied Machine Learning (ICAML), pp. 398- 401, 2021.
Download now