Computer security

Proiect
8/10 (1 vot)
Domeniu: Calculatoare
Conține 1 fișier: doc
Pagini : 42 în total
Cuvinte : 10795
Mărime: 430.11KB (arhivat)
Publicat de: Edita S.
Puncte necesare: 10
Proiectul este in limba engleza si este despre vulnerabilitati si securitate in calculatoare

Cuprins

  1. Abstract 2
  2. Title: System Security Assessment using Vulnerability Repositories 1
  3. Chapter 1: Introduction 1
  4. Background of the research 1
  5. Problem statement 1
  6. Research aim 2
  7. Research Objectives 2
  8. Research Questions 2
  9. Statement of Hypothesis 2
  10. Rationale of the study 2
  11. Significance of the study 3
  12. Route map of research 3
  13. Chapter 2: Literature Review 6
  14. Project Plan 11
  15. Chapter 3: Research Methodology 13
  16. Chapter 4: Findings and Analysis 22
  17. References 37

Extras din proiect

Abstract

System security illustrates the protection of system from unwanted and unauthorised access. This denotes that system is vulnerable to attack if it is not handled in an effectual manner and appropriate measures are not being taken. The software applications along with operating systems are exploitable to vulnerabilities like SQL injection and various others which already exist. System security illustrates the method which can be utilised by individuals or organisation for securing their assets. For an instance, firewall is utilised for improvising security. In this rules are formulated for filtering unwanted intrusions so that they do not get access to the system and carry out any kind of harmful activities. Thus, there is a need of a tool through whose assistance these vulnerabilities can be measured and their likeability can be minimised.

Title: System Security Assessment using Vulnerability Repositories

Chapter 1: Introduction

Operating system is liable for controlling access to resources that comprises of sensitive data. This implies control of access to resources of computer systems that involves data as well as operating system files. This is referred to as system security (Fu and et. al, 2019). Security vulnerability illustrates the weakness of an adversary which can be taken advantage off to compromise with availability, confidentiality along with integrity of resources. As the technology is evolving, there is enhanced probability to enter within them. The operating system and software apps have become exploitable to the system vulnerabilities which to leads to security concerns. Vulnerability denotes weakness that may be exploited via threat actor like attacker carrying out unauthorised actions in computer system. Basically, it implies cyber security term that illustrates flaw within system, which leads to creation of open attack. They signify weakness of computer system that comprises of procedures or anything that leads to expose information security. For this it is necessary for identification of applications which have vulnerabilities and can lead to have worst impact on individuals system. This will lead to identify vulnerability that might be prevented to from attacking as well as having access to data.

Background of the research

Computer vulnerability refers to cyber security term that denotes defect within a system that makes it prone to attacks. This signifies type of weakness which is present within computer system or mobile phones that comprises of set of procedures or aspects that lead to aid information security by which this can be exposed to threat. This can lead individuals to have various problems like threat of leakage of their private information (Bhatia, Christopher and Thangapandian, 2020). In case if firm’s network is being exposed or mobile device of any employee is accessed by intruder then they can have credential information of them which can be utilised against then. Even identity theft can be used to have access to wide range of data.

Problem statement

Operating system implies software which interacts with hardware as well as aids other programs to execute. This involves fundamental files or system software that is required by computers along with mobile phones requires OS to boot up and carry out their functionalities (Casola and et .al, 2020). Behind this lots of programming is involved in different languages basically, it is Java, C and many more languages which allows firms as well as individuals to carry out their operations in smooth manner. This leads to certain vulnerabilities that pose threat to these devices as there is a probability that program might have skipped certain aspects which makes them vulnerable. This means that there is a need for an application that will lead to identify these vulnerable apps which will lead to hamper the functionalities of operations or information stored within them (Chen and et. al, 2020).

Research aim

“To identify the system security assessment through the usage of vulnerability repositories”

Research Objectives

- To identify the concept of system security along with vulnerabilities present within.

- To identify the impact of existing software vulnerability upon apps as well as operating system.

- To analyse the effectiveness of creating a new tool in order to reduce the risk of system vulnerability.

Research Questions

- Illustrate concept of system security along with vulnerabilities within them.

- Identify the impact of existing software vulnerability upon apps as well as operating system.

- Conduct analysis of effectiveness of creating a new tool in order to reduce the risk of system vulnerability.

Statement of Hypothesis

H0: New tool for system security will lead to have affirmative reduction of risks associated with system vulnerabilities.

H1: New tool for system security will not have any influence on reducing risks related with system vulnerabilities.

Bibliografie

Books & Journals

Bhatia, A., Christopher, S. and Thangapandian, W., American Megatrends Inc, 2020. Auto detection mechanism of vulnerabilities for security updates. U.S. Patent Application 16/171,541.

Casola, V. and et .al, 2020. A Novel Security-by-Design Methodology: Modeling and Assessing Security with a Quantitative Approach. Systems and Software, 1(1), pp.1-13.

Chen, J. and et. al, 2020. An Automatic Software Vulnerability Classification Framework Using Term Frequency-Inverse Gravity Moment and Feature Selection. Journal of Systems and Software, p.110616.

Choudhary, S. and et. al, 2020. Proposed Data Structure for Storage of Metrics Values: Misuse Case Oriented Quality Requirements (MCOQR) Framework Perspective. In Performance Management of Integrated Systems and its Applications in Software Engineering (pp. 211-215). Springer, Singapore.

Conklin, W.A. and et. al, 2015. Principles of computer security. McGraw-Hill Education Group.

Dorsey, L.C. and et. al, 2020. Self healing databases for predictive risk analytics in safety-critical systems. Journal of Loss Prevention in the Process Industries, 63, p.104014.

Dotson, J. and et. al, Whistic Inc, 2020. Methods and systems of assessing and managing information security risks in a computer system. U.S. Patent 10,592,675.

Eghan, E.E. and et. al, 2020. The missing link- A semantic web based approach for integrating screencasts with security advisories. Information and Software Technology, 117, p.106197.

Fisch, E. A., White, G. B. and Pooch, U.W., 2017. Computer system and network security. CRC press.

Fu and et. al, 2019. Research on joint optimal dispatching method for hybrid power system considering system security. Applied energy, 238, pp.147-163.

Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016. Handbook of research on modern cryptographic solutions for computer and cyber security. IGI global.

Holz, E.A. and et. al, International Business Machines Corp, 2020. Amalgamating code vulnerabilities across projects. U.S. Patent 10,621,361.

HUANG, T. And et. al, 2020. CHALLENGES AND NECES CHALLENGES AND NECESSITIES OF VULNERABILITY VULNERABILITY ASSESSMENT ASSESSMENT FOR POWER SYSTEMS POWER SYSTEMS POWER SYSTEMS INFRASTRUCTU INFRASTRUCTU INFRASTRUCTURES.

Kelley, S.H., Jain, A.S.C. and Turner, S., Airwatch LLC, 2020. Detecting vulnerabilities in managed client devices. U.S. Patent Application 16/600,986.

Kudjo, P.K. and et. al, 2020. The effect of Bellwether analysis on software vulnerability severity prediction models. Software Quality Journal, pp.1-34.

Lever, K.E. and Kifayat, K., 2020. Identifying and mitigating security risks for secure and robust NGI networks. Sustainable Cities and Society, p.102098.

Li, D., Assured Enterprises Inc, 2020. Method and system for identification of security vulnerabilities. U.S. Patent 10,528,745.

Luh, R. and et. al, 2020. PenQuest: a gamified attacker/defender meta model for cyber security assessment and education. Journal of Computer Virology and Hacking Techniques, 16(1), pp.19-61.

Preview document

Computer security - Pagina 1
Computer security - Pagina 2
Computer security - Pagina 3
Computer security - Pagina 4
Computer security - Pagina 5
Computer security - Pagina 6
Computer security - Pagina 7
Computer security - Pagina 8
Computer security - Pagina 9
Computer security - Pagina 10
Computer security - Pagina 11
Computer security - Pagina 12
Computer security - Pagina 13
Computer security - Pagina 14
Computer security - Pagina 15
Computer security - Pagina 16
Computer security - Pagina 17
Computer security - Pagina 18
Computer security - Pagina 19
Computer security - Pagina 20
Computer security - Pagina 21
Computer security - Pagina 22
Computer security - Pagina 23
Computer security - Pagina 24
Computer security - Pagina 25
Computer security - Pagina 26
Computer security - Pagina 27
Computer security - Pagina 28
Computer security - Pagina 29
Computer security - Pagina 30
Computer security - Pagina 31
Computer security - Pagina 32
Computer security - Pagina 33
Computer security - Pagina 34
Computer security - Pagina 35
Computer security - Pagina 36
Computer security - Pagina 37
Computer security - Pagina 38
Computer security - Pagina 39
Computer security - Pagina 40
Computer security - Pagina 41
Computer security - Pagina 42

Conținut arhivă zip

  • Computer security.doc

Alții au mai descărcat și

E-Guvernare

Motto: ”Obstacolele ce împiedică dorința, devin elanuri ce te împing spre împlinire”. (William Shakespeare) E-Guvernare Capitolul 1. Guvernarea...

Arhitectura calculatoarelor - Intel vs AMD

Rezultatele din testul 3DS Max 7 SPECapc Test Testul alaturat consta in crearea modelelor 3D, modificarea si randarea scripturilor. Conform...

Autentificarea prin semnătură digitală

Introducere O semnatura digitala reprezinta o informatie care il identifica pe expeditorul unui document. Semnatura digitala este creata prin...

Programare

Scopul lucrarii: Insusirea procedeelor de utilizare a constructiilor elementare a limbajului C destinate calculelor conform formulelor propuse....

Sistem de Prognosticare a Unei Avarii

Acest sistem calculeaza gradul de avariere a unei cladiri în cazul unui cutremur, precum si posibila necesitate a reconstructiei cladirii (partiala...

Te-ar putea interesa și

Combaterea infracționalității informatice în România

INTRODUCERE Reţelele de comunicaţii electronice şi sistemele informatice au devenit o parte esenţiala din viaţa de zi cu zi a oamenilor, tinzând...

Infracțiune și securitate în domeniul informatic

Introducere Fiecare perioada importanta a fost marcata de catre un eveniment semnificativ pentru acea epoca, incepand de la descoperirea focului...

Reproducerea neautorizată a programelor de calculator - forme și modalități în Administrația Publică

Capitolul I Conceptul de infracţiune şi trăsăturile ei esenţiale 1.1. Infracţiunea – instituţie fundamentală a dreptului penal INFRACŢIUNEA-...

Manipularea Cecurilor Electronice în Sistemele de Internet Banking

INTRODUCERE Societatea umanã cunoaşte în momentul de faţã una din cele mai profunde transformãri din întreaga ei existenţã, în care informatica...

Actele de Autoritate cu Caracter Militar

Introducere În mai putin de o generatie, revolutia informationala si introducerea calculatoarelor în aproape fiecare dimensiune a societatii a...

Audit Informatic

Denumire societate: SC COSMETICO SRL Obiect activitate: distributie / comert produse cosmetice Organigrama: atasat in Anexa 1 Societatea...

Sisteme Informatice de Distirbuție în Cadrul Organizațiilor

I. INTRODUCERE Tehnologia informaţiei cu componentele sale: telecomunicaţiile, reţelele, computerele şi resursele informaţionale sunt disponibile...

Etica internetului din punct de vedere teologic

1. Cum trebuie percepută infracţionalitatea informatică? În termeni juridici, infracţiunea informaticã presupune folosirea calculatorului ca...

Ai nevoie de altceva?