logo

System Security Assessment using Vulnerability Repositories

42 Pages12515 Words74 Views
   

Added on  2023-01-13

About This Document

This research aims to identify the system security assessment through the usage of vulnerability repositories. It explores the concept of system security, vulnerabilities present within, and the impact of existing software vulnerabilities on apps and operating systems. The research also analyzes the effectiveness of creating a new tool to reduce the risk of system vulnerability.

System Security Assessment using Vulnerability Repositories

   Added on 2023-01-13

ShareRelated Documents
Computer Security
System Security Assessment using Vulnerability Repositories_1
Abstract
System security illustrates the protection of system from unwanted and unauthorised
access. This denotes that system is vulnerable to attack if it is not handled in an effectual manner
and appropriate measures are not being taken. The software applications along with operating
systems are exploitable to vulnerabilities like SQL injection and various others which already
exist. System security illustrates the method which can be utilised by individuals or organisation
for securing their assets. For an instance, firewall is utilised for improvising security. In this rules
are formulated for filtering unwanted intrusions so that they do not get access to the system and
carry out any kind of harmful activities. Thus, there is a need of a tool through whose assistance
these vulnerabilities can be measured and their likeability can be minimised.
System Security Assessment using Vulnerability Repositories_2
Table of Contents
Abstract............................................................................................................................................2
Title: System Security Assessment using Vulnerability Repositories.............................................1
Chapter 1: Introduction....................................................................................................................1
Background of the research.........................................................................................................1
Problem statement.......................................................................................................................1
Research aim...............................................................................................................................2
Research Objectives....................................................................................................................2
Research Questions.....................................................................................................................2
Statement of Hypothesis.............................................................................................................2
Rationale of the study.................................................................................................................2
Significance of the study.............................................................................................................3
Route map of research.................................................................................................................3
Chapter 2: Literature Review...........................................................................................................6
Project Plan....................................................................................................................................11
Chapter 3: Research Methodology................................................................................................13
Chapter 4: Findings and Analysis..................................................................................................22
References......................................................................................................................................37
System Security Assessment using Vulnerability Repositories_3
Title: System Security Assessment using Vulnerability Repositories
Chapter 1: Introduction
Operating system is liable for controlling access to resources that comprises of sensitive
data. This implies control of access to resources of computer systems that involves data as well
as operating system files. This is referred to as system security (Fu and et. al, 2019). Security
vulnerability illustrates the weakness of an adversary which can be taken advantage off to
compromise with availability, confidentiality along with integrity of resources. As the
technology is evolving, there is enhanced probability to enter within them. The operating system
and software apps have become exploitable to the system vulnerabilities which to leads to
security concerns. Vulnerability denotes weakness that may be exploited via threat actor like
attacker carrying out unauthorised actions in computer system. Basically, it implies cyber
security term that illustrates flaw within system, which leads to creation of open attack. They
signify weakness of computer system that comprises of procedures or anything that leads to
expose information security. For this it is necessary for identification of applications which have
vulnerabilities and can lead to have worst impact on individuals system. This will lead to identify
vulnerability that might be prevented to from attacking as well as having access to data.
Background of the research
Computer vulnerability refers to cyber security term that denotes defect within a system
that makes it prone to attacks. This signifies type of weakness which is present within computer
system or mobile phones that comprises of set of procedures or aspects that lead to aid
information security by which this can be exposed to threat. This can lead individuals to have
various problems like threat of leakage of their private information (Bhatia, Christopher and
Thangapandian, 2020). In case if firm’s network is being exposed or mobile device of any
employee is accessed by intruder then they can have credential information of them which can be
utilised against then. Even identity theft can be used to have access to wide range of data.
Problem statement
Operating system implies software which interacts with hardware as well as aids other
programs to execute. This involves fundamental files or system software that is required by
computers along with mobile phones requires OS to boot up and carry out their functionalities
(Casola and et .al, 2020). Behind this lots of programming is involved in different languages
System Security Assessment using Vulnerability Repositories_4
basically, it is Java, C and many more languages which allows firms as well as individuals to
carry out their operations in smooth manner. This leads to certain vulnerabilities that pose threat
to these devices as there is a probability that program might have skipped certain aspects which
makes them vulnerable. This means that there is a need for an application that will lead to
identify these vulnerable apps which will lead to hamper the functionalities of operations or
information stored within them (Chen and et. al, 2020).
Research aim
“To identify the system security assessment through the usage of vulnerability
repositories”
Research Objectives
To identify the concept of system security along with vulnerabilities present within.
To identify the impact of existing software vulnerability upon apps as well as operating
system.
To analyse the effectiveness of creating a new tool in order to reduce the risk of system
vulnerability.
Research Questions
Illustrate concept of system security along with vulnerabilities within them.
Identify the impact of existing software vulnerability upon apps as well as operating
system.
Conduct analysis of effectiveness of creating a new tool in order to reduce the risk of
system vulnerability.
Statement of Hypothesis
H0: New tool for system security will lead to have affirmative reduction of risks associated with
system vulnerabilities.
H1: New tool for system security will not have any influence on reducing risks related with
system vulnerabilities.
Rationale of the study
Technology is evolving and ways individuals and firms are dependent on it which leads
intruders to carry out the attacks in an easy manner (Choudhary and et. al, 2020). To understand
this aspect an instance can be taken into consideration like when individuals download any
System Security Assessment using Vulnerability Repositories_5
application they are asked for allowing application to access their contact details, images and
other information. These details might be accessed by third person or intruder to have
unauthenticated access to their requirements. This will have high pessimistic impact on them or
have access to their email and carry out attacks by using their devices as a launching pads as that
they cannot be identified. This makes it crucial to have an alternative to deal with this aspect as it
will have adverse impact on individual whose device is compromised in addition to this there is
high probability that intruder might have details of their login credentials into different
applications or websites which are being used by them (Dorsey and et. al, 2020).
This illustrates that even after peculiar app that is vulnerable is deleted then there is high
probability that attack can take place. So, to deal with such kind of situations it is essential there
is an alternative that will provide an insight into which app is vulnerable and which is not. This
dissertation is based on this concept only in which tool will be formulated that will assist within
detection of vulnerable attacks. For this, it is critical for researcher to take all the aspects in
precise manner and work done by other authors with reference to this as it will furnish a strong
base for carrying out the research.
Significance of the study
This research is carried out on system security as it is critical aspect that has to be
considered. Through this systems can be prevented from getting exploited. Efficacious use of
technology leads to elimination of such aspects but also makes them more prone to different
attacks as individuals are dependent on their devices for certain activities (Dotson and et. al,
2020). Furthermore, they more often download and install different applications without taking
into consideration the repercussions associated with this. This dissertation will provide with tool
that will assist within detecting such kind of applications which will make them prone to attacks.
Overall there will an affirmative impact on the ways people use their devices and have secured
system.
Route map of research
This is crucial aspect within research that assists readers to classify adequate data
associated with each chapter to illustrate what is studied is defined as route map (Eghan and et.
al, 2020). Within this section of dissertation, unlike chapters are contained, they are specified
below with reference to information that will be presented by them.
System Security Assessment using Vulnerability Repositories_6
Chapter 1: Introduction: This illustrates overview or introductory overview of aspects
connected with dissertation. This activity involves complete information and base that will
define overview of the topic (Holz and et. al, 2020). Through this chapter, reader can have data
for research aims, objectives, questions related with this along with background of the study.
Chapter 2: Literature Review: This denotes second chapter of dissertation which
involves study that is being carried out by authors. With reference to this section, wide range of
publications, articles, books and many other sources will be used. They will be accountable to
support reader with opportunities to have all the crucial data related with work done by other
researchers. In this context, various researchers have rendered their opinions and view point with
reference to system security and vulnerabilities associated with this. Along with this, certain
aspects will be depicted that will assist them within having adequate information related with this
as well as identify the gap within work done by them.
Chapter 3: Research Methodology: It is the next chapter or activity within dissertation
that is completely dependent on research methods that have been carried out. Within this
research section, there are diverse methods that involve secondary as well as primary methods
for collecting data. Qualitative or quantitative research, instruments, philosophies along with
various other perspectives connected with this dissertation (HUANG and et. al, 2020). It implies
critical method which is responsible to support researcher through which they can have precise
data associated with system security and vulnerabilities.
Chapter 4: Findings and analysis: This is the next chapter of dissertation that will assist
in interpretation of information or data with reference to the topic. Within this section of
research, frequency table will be illustrated which will help investigator in determination of
decided along with undecided respondents. Along with this, here different tables along with
graphs are utilised which are completely based on response or frequency tables that are attained
via respondents.
Chapter 5: Discussion: It denotes next chapter that will aid investigator to provide
researchers with relevant recognition with reference to primary data. For this, literature review
can be used to examine secondary data that is related with system security (Kelley, Jain and
Turner, 2020). Apart from this, questionnaire will be used to acknowledge the influence of tool
and understanding related with vulnerabilities within system.
System Security Assessment using Vulnerability Repositories_7
Chapter 6: Conclusion and Recommendation: It implies last chapter associated with
the dissertation that will provide adequate data in context of objectives are achieved or not. In
addition to this, it is completely based on research findings along with analysis up to larger
extent. Furthermore, some suggestions will also be to firm on the basis of topic.
System Security Assessment using Vulnerability Repositories_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Governance And Cyber Security
|11
|3243
|86

Computer Security Assignment Solved
|10
|2742
|144

Ethical Hacking: OS Vulnerabilities and Penetration Testing
|12
|2002
|39

Computer Security: Fundamentals, Examples, and Countermeasures
|15
|5240
|98

Computer Security: Elements, Issues, and Frameworks
|15
|5037
|1

Network Security and Data Communications
|10
|2937
|125