Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/9539
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sadrani, Jenil | - |
dc.date.accessioned | 2021-01-05T05:59:51Z | - |
dc.date.available | 2021-01-05T05:59:51Z | - |
dc.date.issued | 2020-06-01 | - |
dc.identifier.uri | http://10.1.7.192:80/jspui/handle/123456789/9539 | - |
dc.description.abstract | Application security has become an inseparable part of Information Security. Now a days organizations develop application for internal use as well as for selling it to the customers. These applications store a huge amount of data which would be of utter importance to the organization or an individual. Securing this information is important as most of the applications would be accessible by the means of internet. There are various Enterprise tools that help detect vulnerability in the application. One of the method used to detect vulnerability is Static Application Security Testing. Here the source code of the application is scanned and based on this, the vulnerability would be detected. Another method is Dynamic Application Security Testing. Here the tool behaves as an attacker and performs analysis to find out the vulnerability. These vulnerabilities should be resolved in order to make the application and in turn the organization's data secure. Every organization has a policy defined in order to make sure that the information that an application processes is secure. For this purpose SOAR tool comes handy. Whenever an application goes on the non-compliant side of the policy, certain steps are required to be taken in order to make them compliant with the organization's policy. If human efforts are used for this it would be very time consuming task and also less efficient. This is where SOAR comes into place. SOAR monitors application scan results and sends out automatic alerts to the concerned set of people if the application is not compliant with the policies defined in the tool. Thus in order to make sure the applications in an organization are compliant, SOAR is used. | en_US |
dc.publisher | Institute of Technology | en_US |
dc.relation.ispartofseries | 18MCEI10; | - |
dc.subject | Computer 2018 | en_US |
dc.subject | Project Report 2018 | en_US |
dc.subject | Computer Project Report | en_US |
dc.subject | Project Report | en_US |
dc.subject | 18MCEI | en_US |
dc.subject | 18MCEI10 | en_US |
dc.subject | INS | en_US |
dc.subject | INS 2018 | en_US |
dc.subject | CE (INS) | en_US |
dc.title | Secuirty Orchestration, Automation and Response | en_US |
dc.type | Dissertation | en_US |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
18MCEI10.pdf | 18MCEI10 | 226.42 kB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.