Sciweavers

COMCOM
2007

Using the vulnerability information of computer systems to improve the network security

13 years 11 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not patch up all these vulnerabilities on hosts within the network in no time. They need to perform a risk evaluation in order to determine the priority of patching-up vulnerabilities. Besides, they may not have the administrator right on all hosts in the network, but only have the right on these network devices. To keep these vulnerabilities on hosts from exploitation, system managers can set the ACL scripts on network devices. The solution improves security in the network immediately, since some threatened service ports on hosts are blocked from accessed. This paper introduces a method to improve the network security, which consists of the network management, the vulnerability scan, the risk assessment, the access control, and the incident notification. Companioned to the network topology, the risk evaluation...
Yeu-Pong Lai, Po-Lun Hsia
Added 12 Dec 2010
Updated 12 Dec 2010
Type Journal
Year 2007
Where COMCOM
Authors Yeu-Pong Lai, Po-Lun Hsia
Comments (0)