SECURITY VULNERABILITIES

Examples of techniques for handling security vulnerabilities are described herein. According to an example, on finding a publication of a security vulnerability alert, alert data corresponding to the security vulnerability alert is extracted. Thereafter, the alert data is parsed into a structured fo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Dasari Rajashekar, M C Chandan
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Examples of techniques for handling security vulnerabilities are described herein. According to an example, on finding a publication of a security vulnerability alert, alert data corresponding to the security vulnerability alert is extracted. Thereafter, the alert data is parsed into a structured format. Further, an input data file is generated based on the parsed alert data. Based on the input data file, it is determined whether an Information Technology (IT) resource, implemented in a cloud environment, is in a vulnerable state.