Control and Rights related Risk Assessment

Abstract

Deployed software, now-a-days, are continuously under attack. Attackers have been exploiting vulnerabilities for decades and seem to be on rise everyday. Firewalls, intrusion detection and antivirus systems cannot simply solve this problem to the desirable extent. The major reason may be the in-built vulnerabilities, which are not curable at these stages… (More)

4 Figures and Tables

Topics

  • Presentations referencing similar topics