
Journal of Advances in Developmental Research
E-ISSN: 0976-4844
•
Impact Factor: 9.71
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 1
2025
Indexing Partners



















Leveraging Advanced Security Monitoring Tools and Techniques to Detect Vulnerabilities & Potential Security Breaches
Author(s) | Naresh Kumar Rapolu |
---|---|
Country | India |
Abstract | The following research project has underscored the vitality of leveraging advanced security monitoring tools to detect vulnerabilities and potential security breaches. It has incorporated different security mojito tools like intrusion detection systems followed by security information and event management and endpoint detection and response, which are used to detect vulnerabilities and potential security breaches at the initial stages and mitigate them with proactive measures. Furthermore, the research project has been supplemented with strategies like penetration testing followed by vulnerability scanning and security audits daily has enhanced organisational resilience against cyberattacks thereby determining constant upliftment. Keywords: Advanced Security Monitoring Tools, Techniques, IDS, SIEM, EDR, Vulnerabilities, Potential Security Breaches |
Field | Engineering |
Published In | Volume 13, Issue 1, January-June 2022 |
Published On | 2022-02-02 |
Cite This | Leveraging Advanced Security Monitoring Tools and Techniques to Detect Vulnerabilities & Potential Security Breaches - Naresh Kumar Rapolu - IJAIDR Volume 13, Issue 1, January-June 2022. DOI 10.5281/zenodo.14979958 |
DOI | https://doi.org/10.5281/zenodo.14979958 |
Short DOI | https://doi.org/g868k2 |
Share this


CrossRef DOI is assigned to each research paper published in our journal.
IJAIDR DOI prefix is
10.71097/IJAIDR
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
