SECURITY VULNERABILITIES
Examples of techniques for handling security vulnerabilities are described herein. According to an example, on finding a publication of a security vulnerability alert, alert data corresponding to the security vulnerability alert is extracted. Thereafter, the alert data is parsed into a structured fo...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Examples of techniques for handling security vulnerabilities are described herein. According to an example, on finding a publication of a security vulnerability alert, alert data corresponding to the security vulnerability alert is extracted. Thereafter, the alert data is parsed into a structured format. Further, an input data file is generated based on the parsed alert data. Based on the input data file, it is determined whether an Information Technology (IT) resource, implemented in a cloud environment, is in a vulnerable state. |
---|