Paper
28 September 2022 Security analysis and reinforcement of an in-use system
Guoliang Dong, Haiying Xia, Guofang Wu, Chaozhou Chen
Author Affiliations +
Proceedings Volume 12339, Second International Conference on Cloud Computing and Mechatronic Engineering (I3CME 2022); 123391U (2022) https://doi.org/10.1117/12.2654881
Event: Second International Conference on Cloud Computing and Mechatronic Engineering (I3CME 2022), 2022, Chendu, China
Abstract
System running on the Internet may face malicious visits or attacks from different regions and users every day. In addition to the necessary security protection components, the security of the system also requires effective configuration of servers and middleware to improve the security and robustness of the system. This article takes the security reinforcement of an in-use system as an example, uses a vulnerability scanning tool to find out the vulnerabilities of the system, analyzes the vulnerabilities, and proposes a vulnerability fix plan. After the system is reinforced, the security of the system and data can be better guaranteed.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Guoliang Dong, Haiying Xia, Guofang Wu, and Chaozhou Chen "Security analysis and reinforcement of an in-use system", Proc. SPIE 12339, Second International Conference on Cloud Computing and Mechatronic Engineering (I3CME 2022), 123391U (28 September 2022); https://doi.org/10.1117/12.2654881
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Information security

Computer security

Analytical research

Internet

Roads

Safety

RELATED CONTENT


Back to Top