Software Vulnerability Management: How Intelligence Helps in Mitigating Software Vulnerabilities

Software Vulnerability Management: How Intelligence Helps in Mitigating Software Vulnerabilities

Rimsy Dua, Samiksha Sharma, Abhishek Sharma
ISBN13: 9781522560296|ISBN10: 1522560297|EISBN13: 9781522560302
DOI: 10.4018/978-1-5225-6029-6.ch003
Cite Chapter Cite Chapter

MLA

Dua, Rimsy, et al. "Software Vulnerability Management: How Intelligence Helps in Mitigating Software Vulnerabilities." Analyzing the Role of Risk Mitigation and Monitoring in Software Development, edited by Rohit Kumar, et al., IGI Global, 2018, pp. 34-45. https://doi.org/10.4018/978-1-5225-6029-6.ch003

APA

Dua, R., Sharma, S., & Sharma, A. (2018). Software Vulnerability Management: How Intelligence Helps in Mitigating Software Vulnerabilities. In R. Kumar, A. Tayal, & S. Kapil (Eds.), Analyzing the Role of Risk Mitigation and Monitoring in Software Development (pp. 34-45). IGI Global. https://doi.org/10.4018/978-1-5225-6029-6.ch003

Chicago

Dua, Rimsy, Samiksha Sharma, and Abhishek Sharma. "Software Vulnerability Management: How Intelligence Helps in Mitigating Software Vulnerabilities." In Analyzing the Role of Risk Mitigation and Monitoring in Software Development, edited by Rohit Kumar, Anjali Tayal, and Sargam Kapil, 34-45. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-6029-6.ch003

Export Reference

Mendeley
Favorite

Abstract

This chapter describes how with the proliferation of internet users, internet-related security threats are also increasing rapidly because of the software vulnerabilities that arise in software. Basically, there are two terms: bug and vulnerability. No doubt, bug and vulnerability are due to programming errors but vulnerabilities are more dangerous than bugs. Software vulnerability is a kind of flaw that arises in software or is a hole in the security of the software that allows an attacker to exploit that flaw. Unlike bugs, software vulnerability can affect a whole network thereby allowing unauthorised access to the database itself. Integrity and confidentiality of the software product is compromised due to the software vulnerability. These flaws must be patched in order to minimalize the impact of software vulnerability on an organisation. This chapter familiarises the methods of managing software vulnerabilities and discusses mitigation of the risks of different vulnerabilities in a software.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.