The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Risk Assessment and Real Time Vulnerability Identification in IT Environments
Abstract
Contrary to static models of risk analysis, the authors propose a pro-active framework for identifying vulnerabilities and assessing risk in real-time. Instead of searching for vulnerabilities from an external point of view, where the information is obtained by simply exploring a digital asset (computational system composed of hardware and software), the authors propose that software agents (sensors) capable of providing application, configuration and location information be incorporated into assets. Any observed changes, such as physical location, software update or installation, hardware modifications, changes in security policy and others, will be immediately reported by the agent, in a pro-active manner, to a central repository. It is possible to assess risk in a certain environment comparing databases of rules and known vulnerabilities with information about each asset, collected by the sensors and stored in the central repository.
Related Content
Chirag Sharma, Amanpreet Kaur, Priyanka Datta, Yonis Gulzar.
© 2025.
30 pages.
|
M. Johnpaul, Raam Sai Bharadwaj Miryala, Marica Mazurek, G. Jayaprakashnarayana, Ramesh Kumar Miryala.
© 2025.
28 pages.
|
Jatin Arora, Gaganpreet Kaur, Monika Sethi, Saravjeet Singh.
© 2025.
20 pages.
|
L. A. Anto Gracious, L. Sudha, B. Chitra, Gaganpreet Kaur, V. Sathya, P. Kabitha, R. Siva Subramanian.
© 2025.
28 pages.
|
Bhavik Singla, Anuj Kumar Jain, Gaganpreet Kaur, Nitin Jain, Vishal Jain.
© 2025.
28 pages.
|
P. Vijayalakshmi, K. Subashini, B. Selvalakshmi, G. Sudhakar, Anand Anbalagan, N. Bharathiraja, Gaganpreet Kaur.
© 2025.
22 pages.
|
Djamel Saba, Abdelkader Hadidi.
© 2025.
28 pages.
|
|
|