Abstract Views :158 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, R&D Centre, East Point College of Engg. & Technology, IN
2 Department of CSE,R&D Centre, East Point College of Engg. & Technology, IN
3 Department of CSE, East Point College of Engg. & Technology, IN
Source
International Journal of Engineering Research, Vol 5, No SP 4 (2016), Pagination: 880-884
Abstract
Research has revealed that Software can inherently have weaknesses which can be exploited by hackers. The global IT community has formed a group who are trying to detect constructs in a program which makes the software weak. These programming constructs which make software weak are grouped as in CWE.
Keywords
Vulnerability, SecCheck, CWE, Degree of Insecurity, ISM.
Full Text