To see the other types of publications on this topic, follow the link: Security automation tools.

Journal articles on the topic 'Security automation tools'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security automation tools.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shahane, Gauri. "Network Security (Automation)." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30835.

Full text
Abstract:
The security of an operator’s network is crucial while being increasingly complex to ensure. This is all the more the case with the evolution of the network towards virtualization. In this paper, we will explain how to secure a network and then give some real examples of automation implemented to ensure this security. Finally, we will detail the new risks associated with the implementation of automation tools and share some good security practices around their implementation. Keywords : Network security automation
APA, Harvard, Vancouver, ISO, and other styles
2

Silva, Roberto De Carvalho. "AUTOMATION AND OPTIMIZATION OF THE SAP SOFTWARE INSTALLATION PROCESS IN CORPORATE WORKSTATIONS: IMPACTS ON SCALABILITY AND SECURITY." Revista ft 29, no. 145 (2025): 34–35. https://doi.org/10.69849/revistaft/ch10202504040734.

Full text
Abstract:
The automation and optimization of SAP software installation in corporate workstations are critical for enhancing scalability, security, and efficiency. Manual deployment processes are time-consuming, error-prone, and challenging to standardize in large-scale environments. This study explores automation tools such as Ansible, Terraform, and SCCM to streamline SAP deployment, reducing manual intervention and ensuring consistent configurations across multiple devices. The research also highlights the significance of security measures, including system hardening, least privilege policies, and multi-factor authentication, to mitigate potential vulnerabilities. A comprehensive literature review examines recent advancements in SAP deployment automation, emphasizing scalability and security. Studies demonstrate that integrating automation with cloud-based infrastructures improves deployment consistency, while compliance automation frameworks facilitate regulatory adherence. Additionally, AI-driven monitoring solutions enhance system reliability by predicting failures and optimizing resource allocation. The discussion highlights how automation tools significantly reduce deployment time while improving traceability and security. Standardized installation protocols prevent misconfigurations, and centralized deployment management minimizes human errors. Moreover, implementing security best practices safeguards SAP environments against cyber threats, ensuring compliance with regulatory requirements. This study concludes that automating SAP installation is a strategic necessity for organizations seeking operational efficiency, security, and scalability. Future research should explore AI-based automation to further refine installation processes and enhance proactive threat detection. By adopting automation and security best practices, organizations can achieve a more resilient and efficient SAP deployment framework.
APA, Harvard, Vancouver, ISO, and other styles
3

Rahman, Anisur, Md Ashrafuzzaman, Md Majadul Islam Jim, and Rebeka Sultana. "CLOUD SECURITY POSTURE MANAGEMENT AUTOMATING RISK IDENTIFICATION AND RESPONSE IN CLOUD INFRASTRUCTURES." ACADEMIC JOURNAL ON SCIENCE, TECHNOLOGY, ENGINEERING & MATHEMATICS EDUCATION 4, no. 3 (2024): 151–62. http://dx.doi.org/10.69593/ajsteme.v4i03.103.

Full text
Abstract:
Cloud Security Posture Management (CSPM) tools have become essential in addressing the growing security challenges faced by organizations as they migrate to cloud environments. This study explores the effectiveness of CSPM tools in automating the identification and response to security risks within cloud infrastructures, highlighting their role in reducing misconfigurations, improving compliance, and enhancing overall security posture. Through a mixed-method approach, combining a comprehensive literature review, a survey of IT security professionals, and detailed case study analyses, this research provides a robust evaluation of CSPM tools' capabilities and the challenges associated with their implementation. The findings reveal that organizations utilizing CSPM tools experience significant reductions in security incidents and operational inefficiencies, with automation playing a crucial role in enabling real-time threat detection and response. However, the study also identifies critical barriers to CSPM adoption, including integration complexities, cost concerns, and organizational resistance to automated security solutions. These challenges suggest that while CSPM tools offer substantial benefits, their successful deployment requires careful planning, adequate resource allocation, and strategic change management to address both technical and human factors. This study contributes to the existing literature by providing detailed insights into the practical applications and limitations of CSPM tools, offering valuable guidance for organizations seeking to enhance their cloud security strategies through automation.
APA, Harvard, Vancouver, ISO, and other styles
4

Sridevi Kakolu and Muhammad Ashraf Faheem. "Revolutionizing industries through digitization: The strategic importance of mobile application automation." International Journal of Science and Research Archive 8, no. 1 (2023): 973–87. http://dx.doi.org/10.30574/ijsra.2023.8.1.0276.

Full text
Abstract:
In this article, we look at how mobile application automation is a game changer in the digitization of different industries. It discusses how automation makes work more efficient, cuts costs, and offers better user experience by automating app development and deployment processes. The challenges of mobile application automation are discussed, and the challenges and problems that mobile devices present are primarily focused on, such as incompatibility, introducing costs in the setup, and issues with privacy and security. It provides an overview of popular automation tools, i.e., Appium and Selenium, and the relevant uses of these tools in various contexts. This dissertation examines the incorporation of advanced technologies, such as artificial intelligence and machine learning, and their integration to match the changing customer expectations and enhance cyber security measures. Effective implementations are studied and highlighted in case studies from the retail, healthcare, and finance sectors to show automation’s transformative power in business practices. It concludes that mobile application automation is a new technology and a strategic asset that will help organizations gain a competitive advantage in today’s rapidly changing digital world.
APA, Harvard, Vancouver, ISO, and other styles
5

Chintan Udeshi. "The Role of Automation and Platformization in Enhancing Enterprise Cybersecurity." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2984–90. https://doi.org/10.32628/cseit251112314.

Full text
Abstract:
This article examines the critical role of automation and platformization in addressing the challenges faced by modern enterprise cybersecurity. As organizations increasingly adopt hybrid and multi-cloud strategies, they find themselves managing a complex array of security tools, leading to overwhelming volumes of alerts and fragmented visibility. The paper explores how Security Orchestration, Automation, and Response (SOAR) technologies can streamline security operations by automating routine tasks, integrating disparate tools, and significantly reducing incident response times. Additionally, it discusses the trend towards platformization and vendor consolidation, highlighting the benefits of centralized threat visibility and consistent policy enforcement across diverse environments. The article argues that these approaches not only enhance an organization's ability to detect and respond to threats but also allow security teams to focus on more advanced, high-priority issues. By presenting a comprehensive overview of these strategies, the paper provides valuable insights for organizations seeking to improve their cybersecurity posture in an increasingly complex digital landscape.
APA, Harvard, Vancouver, ISO, and other styles
6

Tilbury, Jack, and Stephen Flowerday. "Humans and Automation: Augmenting Security Operation Centers." Journal of Cybersecurity and Privacy 4, no. 3 (2024): 388–409. http://dx.doi.org/10.3390/jcp4030020.

Full text
Abstract:
The continuous integration of automated tools into security operation centers (SOCs) increases the volume of alerts for security analysts. This amplifies the risk of automation bias and complacency to the point that security analysts have reported missing, ignoring, and not acting upon critical alerts. Enhancing the SOC environment has predominantly been researched from a technical standpoint, failing to consider the socio-technical elements adequately. However, our research fills this gap and provides practical insights for optimizing processes in SOCs. The synergy between security analysts and automation can potentially augment threat detection and response capabilities, ensuring a more robust defense if effective human-automation collaboration is established. A scoping review of 599 articles from four databases led to a final selection of 49 articles. Thematic analysis resulted in 609 coding references generated across four main themes: SOC automation challenges, automation application areas, implications on analysts, and human factor sentiment. Our findings emphasize the extent to which automation can be implemented across the incident response lifecycle. The SOC Automation Matrix represents our primary contribution to achieving a mutually beneficial relationship between analyst and machine. This matrix describes the properties of four distinct human-automation combinations. This is of practical value to SOCs striving to optimize their processes, as our matrix mentions socio-technical system characteristics for automated tools.
APA, Harvard, Vancouver, ISO, and other styles
7

Weil, Ramon. "Security Orchestration, Automation and Response (SOAR)." Technische Sicherheit 13, no. 11-12 (2023): 41–42. http://dx.doi.org/10.37544/2191-0073-2023-11-12-41.

Full text
Abstract:
Risikobewusste Unternehmen haben in der Regel mehrere IT-Sicherheitslösungen im Einsatz, um ihre Organisation vor Cyberbedrohungen zu schützen. Auch wenn die einzelnen Tools optimal funktionieren – sie arbeiten nicht unbedingt zusammen. Aufgrund begrenzter Ressourcen und dem Mangel an verfügbaren Fachkräften besteht für viele Unternehmen die besondere Herausforderung, mit dieser Entwicklung Schritt zu halten. Aus diesem Grund hat die Weiterentwicklung von Security Orchestration, Automation and Response (SOAR) deutlich an Fahrt aufgenommen. Der Beitrag zeigt, wie SOAR-Systeme die Cybersicherheit revolutionieren.
APA, Harvard, Vancouver, ISO, and other styles
8

Choi, Eun-Jin, and Seungil Noh. "Analysis of U.S. RMF Security Automation Tools for K-RMF Security Assessments." Journal of the Korea Academia-Industrial cooperation Society 25, no. 8 (2024): 341–49. http://dx.doi.org/10.5762/kais.2024.25.8.341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mojesh, L. "Automated Security Testing Tool." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50199.

Full text
Abstract:
Objective: Develop a tool that automates security testing for web applications using Flask (for the tool's UI and control) and Selenium (for browser automation and interaction). The tool will navigate through a web application, perform security scans (leveraging external tools or libraries), and generate reports summarizing the findings. Detailed Description: This project aims to create a user-friendly web application that simplifies and automates common security testing tasks for web applications. It will provide a centralized interface to configure tests, launch scans, and view results. The core functionality will rely on Selenium to interact with the target web application and integrate with various security scanning tools or libraries to identify potential vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
10

Kanthed, Surbhi. "Automation Tools for DevOps: Leveraging Ansible, Terraform, and Beyond." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem01286.

Full text
Abstract:
DevOps has rapidly become a cornerstone for modern software development, providing faster release cycles and improved collaboration between development and operations teams. Central to DevOps practices is automation, which addresses the complexity of provisioning and configuring diverse computing environments. This white paper explores state-of-the-art automation tools, with a focus on Ansible for configuration management and Terraform for infrastructure as code (IaC). An extensive review of recent scholarly articles, conference papers, and real-world case studies reveals the unique strengths and limitations of these tools, including Ansible’s agentless architecture and Terraform’s robust declarative approach. In examining multi-cloud and hybrid deployments, the paper identifies best practices in modular code design, version control, automated testing, and policy-as-code for security and compliance. Empirical case studies demonstrate the performance, scalability, and maintainability benefits organizations gain from integrating Ansible and Terraform, while also highlighting challenges related to skill gaps, complex orchestration, and state management. Finally, the paper discusses emerging trends, including AI-driven infrastructure provisioning, serverless computing at the edge, and unified frameworks that incorporate multiple automation tools. By synthesizing these findings, this paper contributes a comprehensive roadmap for adopting and optimizing DevOps automation. It underscores how strategic integration of Ansible, Terraform, and complementary solutions not only reduces operational overhead but also enhances reliability, security, and agility. The outcomes empower practitioners and researchers to address current limitations, seize emerging opportunities, and drive further innovation in the rapidly evolving landscape of DevOps automation. Keywords: DevOps, Automation, Ansible, Terraform, Infrastructure as Code (IaC), Configuration Management, Orchestration, CI/CD, Policy-as-Code, Multi-Cloud, Hybrid Cloud, Security, Compliance, State Management, AI-Driven Automation, Serverless, Observability, GitOps, Modular Design, Monitoring, Scalability.
APA, Harvard, Vancouver, ISO, and other styles
11

Shekar, Vinay C., Sayeed Ur Rahman, Srinivas Vishal Bhat DB, Abdul Mateen, and Ranjitha A.S. "Enhanced Network Security for IoT based Home Automation System." International Journal of Emerging Research in Management and Technology 6, no. 6 (2018): 278. http://dx.doi.org/10.23956/ijermt.v6i6.282.

Full text
Abstract:
Advancement in automation technology has led to automation in many specific fields which has made life simpler and easier in all aspects. Where in the rise of Internet of Things (IoT) is taking advantage of the evolving automation technology, once such field in which the IoT is taking advantage of automation technology is Home Automation (HA). IoT for home automation is used in order to control home appliances such as lights, ovens, refrigerators, fans etc., In this project we present a home automation system with the help of Raspberry Pi added to which we provide enhanced network security to the home automation system with the open source tools Snort(Wireless Intrusion Detection System-IDS) and IpTables(Firewall).
APA, Harvard, Vancouver, ISO, and other styles
12

Brown, Preston, Kallan Christensen, and David Schuster. "An Investigation of Trust in a Cyber Security Tool." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (2016): 1454–58. http://dx.doi.org/10.1177/1541931213601333.

Full text
Abstract:
Trust has been identified as an important variable in the effective use of automated tools, including cyber security tools. The purpose of this exploratory study was to investigate factors affecting trust in a cyber-security tool. Undergraduate participants were asked to perform a simplified network intrusion monitoring task with the help of a software agent. The reliability of the software agent was manipulated at three levels (60%, 80%, and 100% reliability). Results indicated that trust increased as the automation increased in reliability. However, contrary to our hypotheses, performance decreased as the automation increased in reliability. Implications for future research on the antecedents of trust in human-automation interaction in cyber security are discussed.
APA, Harvard, Vancouver, ISO, and other styles
13

Sujan Kumar, Kummari. "Next-Generation Security Operations: Leveraging Automation for Proactive Threat Mitigation." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43432.

Full text
Abstract:
ABSTRACT As cybersecurity threats evolve, traditional Security Operations Centers (SOCs) face challenges such as alert overload, manual processes, and delayed incident response. The proposed method is automated SOC solution leveraging open-source technologies to enhance threat detection, streamline investigation processes, and enable proactive threat mitigation. The approach integrates comprehensive threat monitoring, a collaborative case management system, and an automation framework for security response actions. By implementing predefined processes and responsive capabilities, the solution empowers SOCs to automatically execute predetermined actions based on detected threats. The proposed architecture is scalable and adaptable, allowing organizations to tailor the SOC to their specific needs while benefiting from open-source tools and automation. By automating repetitive tasks and facilitating rapid response, the solution aims to reduce analyst workload, minimize human error, and enhance overall security posture. The proposed method involves implementing and evaluating the integrated solution in a simulated environment, assessing its performance in detecting and mitigating various cyber threats compared to traditional manual approaches. Potential challenges and limitations are also discussed, paving the way for future enhancements. Keywords: Security Operations Center (SOC), Security Information and Event Management (SIEM), Security Orchestration Automation and Response (SOAR), Threat Detection
APA, Harvard, Vancouver, ISO, and other styles
14

Janki, Velani. "Advancements in GitHub Automation and Workflow: A Comprehensive Exploration." International Journal of Innovative Science and Modern Engineering (IJISME) 12, no. 2 (2024): 10–13. https://doi.org/10.35940/ijisme.B1311.12020224.

Full text
Abstract:
<strong>Abstract:</strong> The landscape of software development has been significantly transformed by the integration of automation and streamlined workflows, with GitHub emerging as a pivotal platform in this evolution. This research paper delves into the multifaceted realm of GitHub automation and workflow, investigating key aspects that contribute to enhanced efficiency, collaboration, and code quality in modern development practices. The paper begins by exploring the utilization of GitHub Actions for establishing robust Continuous Integration and Continuous Deployment (CI/CD) pipelines. Best practices for designing reliable workflows are discussed, along with insights into customizing workflows to suit diverse project requirements through the use of custom actions and templates. The automation of code reviews is scrutinized, with a focus on tools and practices that facilitate objective and efficient evaluation of code quality. The paper also investigates GitHub's role in security automation, covering strategies for vulnerability detection and integration of security checks into the development lifecycle. Collaborative workflows on GitHub, including branch management, pull requests, and code reviews, are explored as pivotal components fostering teamwork. The integration of GitHub into DevOps practices is analyzed, showcasing its synergy with popular DevOps tools and platforms. As a forward-looking endeavor, the research paper concludes by examining emerging trends and technologies in GitHub automation. By encapsulating a comprehensive overview of the current state and future trajectories of GitHub automation and workflow, this paper aims to contribute to the collective understanding of best practices, challenges, and opportunities in contemporary software development.
APA, Harvard, Vancouver, ISO, and other styles
15

Kämppi, Jarno, and Karo Saharinen. "Key Actions to Enable Automation for Mobile Network Security Operations." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 224–32. http://dx.doi.org/10.34190/eccws.23.1.2232.

Full text
Abstract:
Over time, the landscape of Cyberspace surrounding Internet Service Providers (ISPs) has undergone enduring transformations. Notably, mobile networks, integral to contemporary societal infrastructure, consistently encounter evolving cybersecurity threats and risks. ISP processes have adapted with a persistent focus on optimizing network performance and availability, yet the challenges emerge from a laborious and protracted network change management process, hindering the practical automation of network security. Addressing the rightful demand for the highest level of security from mobile network users, our research question probes: "How can we intensify the emphasis on network security and facilitate the automation of network security operations?" To delve into this, we conducted extensive interviews with ISPs globally, affirming the inherent difficulty in automating security operations. The findings categorize challenges into three domains: Security Culture, Operational Processes, and Tools. Cultivating a security culture demands a pivotal commitment to change from top management, coupled with dedicated time and resources. Essential to this is the enhancement of security competence, extending beyond specialists to encompass network engineering staff. Robust network security not only safeguards against threats but significantly influences various business processes. Initiating a secure network requires ISPs to articulate explicit security requirements during the network procurement process, exerting pressure on vendors to fortify systems with a security-by-design approach at the factory. Critical to this is the secure deployment of networks, integrating comprehensive network hardening during the build phase. However, findings indicate a prevalent oversight where network security configuration changes are often neglected or deprioritized in favor of network performance. Achieving a harmonious balance between security and performance necessitates a predefined agreement on a network security configuration baseline. This collaborative effort involves network security specialists and competent network engineers. To effectively monitor and enforce network security configuration, ISPs require automation-enabled tools with the predefined baseline, offering capabilities for monitoring and enforcing network assets. In conclusion, our research emphasizes the imperative need for a paradigm shift in organizational culture, operational processes, and tool utilization to enhance the focus on network security and enable the critical automation of network security operations within the ever-evolving landscape of Cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
16

Tilbury, Jack, and Stephen Flowerday. "Automation Bias and Complacency in Security Operation Centers." Computers 13, no. 7 (2024): 165. http://dx.doi.org/10.3390/computers13070165.

Full text
Abstract:
The volume and complexity of alerts that security operation center (SOC) analysts must manage necessitate automation. Increased automation in SOCs amplifies the risk of automation bias and complacency whereby security analysts become over-reliant on automation, failing to seek confirmatory or contradictory information. To identify automation characteristics that assist in the mitigation of automation bias and complacency, we investigated the current and proposed application areas of automation in SOCs and discussed its implications for security analysts. A scoping review of 599 articles from four databases was conducted. The final 48 articles were reviewed by two researchers for quality control and were imported into NVivo14. Thematic analysis was performed, and the use of automation throughout the incident response lifecycle was recognized, predominantly in the detection and response phases. Artificial intelligence and machine learning solutions are increasingly prominent in SOCs, yet support for the human-in-the-loop component is evident. The research culminates by contributing the SOC Automation Implementation Guidelines (SAIG), comprising functional and non-functional requirements for SOC automation tools that, if implemented, permit a mutually beneficial relationship between security analysts and intelligent machines. This is of practical value to human automation researchers and SOCs striving to optimize processes. Theoretically, a continued understanding of automation bias and its components is achieved.
APA, Harvard, Vancouver, ISO, and other styles
17

Ravi, Chandra Thota. "Cloud-Native DevSecOps: Integrating Security Automation into CI/CD Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–19. https://doi.org/10.5281/zenodo.15036934.

Full text
Abstract:
As software has become deployed more rapidly in the current fast pace of software development, security has become important, particularly in cloud-native environments where CI/CD pipelines play an important role in operations. Many ways we use to secure traditional systems do not keep up with the fluidity and the fact that they are automated in modern DevOps workflows. As a result, DevSecOps&mdash;combining security with the DevOps process&mdash;has become the key strategy to maintain the software's security while retaining speed and agility. This article discusses how security automation can be incorporated into cloud-native DevSecOps to make security controls available in an automated way as an integral part of CI/CD pipelines. It gives an all-encompassing assessment of how security automation can decrease vulnerabilities, minimize human intercession, and execute strength through the whole programming turn of events life cycle (SDLC). It examines CI/CD pipeline security challenges, namely, misconfiguration, dependency vulnerabilities, and runtime risks, and effective automation techniques to tackle them. In addition, the article discusses best practices for the implementation of security automation through practices such as Static and Dynamic Application Security Testing (SAST/DAST), Automated Compliance checks, Runtime protection with tools like Infrastructure as Code (IaC) Security Scanner, Container Security Solutions and Behaviour Based Anomaly Detection systems. In addition, it provides real-world case studies of security automation in the CI/CD workflow that illustrate how such things can work effectively. An attempt has been made to propose a conceptual framework to depict the points of integration of security automation in DevSecOps through flowcharts, diagrams, and pseudocode examples. Organizations securing automation in cloud-native environments can balance security and speed while retaining agile development practices and resilient software. This article adds to the existing body of thought on DevSecOps with a solution for integrating security automation into CI/CD pipelines in a structured manner. The study offers promising outcomes for industry practitioners and researchers in that more innovation in AI-driven security automation, zero-trust security models, and self-healing CI/CD pipelines can be achieved.
APA, Harvard, Vancouver, ISO, and other styles
18

Tiwari, Pradeep Kumar, Sunil Kr Pandey, W. Thamba Meshach, et al. "Improved Data Security in Cloud Environment for Test Automation Framework and Access Control for Industry 4.0." Wireless Communications and Mobile Computing 2022 (May 25, 2022): 1–9. http://dx.doi.org/10.1155/2022/3242092.

Full text
Abstract:
In analyzing project regressions, automation has emerged as a major agenda in managing changes in software which requires minimum manual intervention. For rapid testing environment, software development processes such as Agile, Scrum, and XP processes depend on continuous integration tools. There is no single tool to handle the project automation, and the main challenge is dependency on multiple tools. The proposed automation tool should support configuration, execution, and debugging facility. Integrating the project automation works such as software configuration management tools Mercurial and Git, job scheduling tools like Jenkins and Apache Continuum, test management tools like TestNG and Selenium need tight integration which is a challenge. The existing PKI infrastructure for access control does not share data among the software tools and processes increasing the complexity when an organization needs to leverage the existing cloud services. The proposed approach optimizes the execution time by taking single CSV with input test case and metadata information and efficiently group and executes the tests automatically. The proposed method includes implementation of security access control mechanism for the jobs execution platform in cloud environment.
APA, Harvard, Vancouver, ISO, and other styles
19

Ponaka, Kamalakar Reddy. "Automated Security Vulnerability Backlog Management." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–4. http://dx.doi.org/10.55041/ijsrem16818.

Full text
Abstract:
In today’s fast-paced development environments, security vulnerabilities often emerge at the same rapid rate as code updates. Security teams and developers face challenges in addressing these vulnerabilities while maintaining operational efficiency. Managing a security backlog manually can be cumbersome, slow, and prone to human error. Automating the security vulnerability backlog allows organizations to track, prioritize, and mitigate security risks more efficiently and effectively, ensuring a secure software development lifecycle (SDLC) without sacrificing agility. This white paper outlines the need for an automated security backlog, the benefits it provides, and strategies for implementing it using modern DevSecOps tools. Keywords — Automated security backlog, vulnerability management, CI/CD, DevSecOps, risk- based prioritization, SAST, DAST, software composition analysis, continuous security, vulnerability tracking, security remediation, cybersecurity automation, security risk management
APA, Harvard, Vancouver, ISO, and other styles
20

Chura, T. R., and Y. M. Kostiv. "ADAPTATION OF INFORMATION SECURITY IN THE AGILE WORLD." Computer systems and network 7, no. 1 (2025): 307–12. https://doi.org/10.23939/csn2025.01.307.

Full text
Abstract:
The article investigates the integration of information security into Agile software development processes, focusing on the adaptation of DevSecOps methods. The goal was to enhance the implementation of security practices by reducing vulnerability detection time, simplifying the integration of security into the development cycle, and improving team collaboration. The analysis revealed that automation of security testing reduces vulnerability detection time by 40%, while cross-functional teams improve collaboration by 30%. Additionally, DevSecOps implementation decreases the number of vulnerabilities by 35% and reduces financial losses from cyberattacks by 25%. The study also identified key challenges, such as cultural barriers between teams and the technical complexity of implementing security tools, as well as future prospects, including the use of artificial intelligence to enhance threat detection accuracy. The findings highlight the importance of a proactive security approach, automation of security checks using SAST and DAST tools, and the need for staff training to foster a "Security-first" culture. The results can be applied to enhance security in rapidly changing environments and to further develop approaches for integrating DevSecOps into Agile. Keywords: agile development, automation, cybersecurity, DevSecOps, information security, team collaboration, staff training.
APA, Harvard, Vancouver, ISO, and other styles
21

J, Prassanna, Anjali R. Pawar, and Neelanarayanan V. "A REVIEW OF EXISTING CLOUD AUTOMATION TOOLS." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 471. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.20519.

Full text
Abstract:
Many enterprises are running distributed applications on their on-premise servers. However, if load on those servers changes unexpectedly, then itbecomes tedious to scale the resources and requires skilled human power to manage such situations. It may increase the capital expenditure. Hence,many companies have started to migrate their on-premise applications to the cloud. This migration of the applications to the cloud is one of the majorchallenges. To setup and manage the growing complex infrastructure, after migrating these applications to the cloud are really a time-consuming andtedious process which results in downtime. Hence, we need to automate this environment. To achieve architecture for the distributed systems whichsupport security, repeatability, reliability, and scalability, we require some cloud automation tools. This paper summarizes tools such as Terraform andcloud formation for infrastructure automation and Docker and Habitat for application automation.
APA, Harvard, Vancouver, ISO, and other styles
22

Khattar, Kriti. "Docker Like a Pro: Essential Practices for Secure and Scalable Containers." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41900.

Full text
Abstract:
Adopting best practices in project development is crucial for ensuring security, efficiency, and sustainability. Key practices include minimizing security risks by limiting access permissions, optimizing container images for faster deployments, and automating processes to reduce manual intervention. Additionally, effective configuration management, container health checks, and seamless integration of security tools within CI/CD pipelines help maintain system reliability and code quality. By leveraging cross-account access, choosing secure base images, and automating container restarts, projects can maintain operational stability while minimizing downtime. Overall, these practices foster a secure, scalable, and well-maintained environment for application development and deployment. Keywords: Docker Security Practices, Principle of Least Privilege, Multi-Stage Docker file, Docker Image Optimization, Configuration Management, Docker Tagging, Container Health Check, Base Image Selection, Cross-Account Access, CI/CD Pipeline Security, SonarQube, Prisma Cloud, Container Automation
APA, Harvard, Vancouver, ISO, and other styles
23

Mongush, Amyrtaa K., and Igor N. Karmanov. "AUTOMATION OF COMPLEX INFORMATION SECURITY SYSTEMS DESIGN." Interexpo GEO-Siberia 6, no. 2 (2020): 31–35. http://dx.doi.org/10.33764/2618-981x-2020-6-2-31-35.

Full text
Abstract:
Entry of modern society into the information stage of development wake, information security one of the most important problems of our time. The article discusses the possibility of automating the design of an integrated information security system. One of the key stages in the design of an information security system is the assessment of the current state of the information security system through audit. An information security audit allows identifying all vulnerabilities in the system. To automate the detection of vulnerabilities of the investigated object, network scanners are considered. The use of scanners allows solving the problems of identification and analysis of vulnerabilities. A scheme for automating the design of physical protection systems is also considered. In conclusion, the advantages of automating the design of an information protection system are noted, frequently used software tools and utilities for automating individual stages of the design of information protection systems are presented.
APA, Harvard, Vancouver, ISO, and other styles
24

Abhiram, Sanal, Sebastian Anjana, K. Haripriya, V. Adatte Nevin, and S. Sneha. "Virtual Smart Home Automation." Research and Reviews: Advancement in Robotics 7, no. 3 (2024): 4–10. https://doi.org/10.5281/zenodo.13317690.

Full text
Abstract:
<em>This is a first step towards the emerging technology automation. This project demonstrates how to implement a simple automation system in our own home. Along with the automation system home security features are included for additional safety to the home using fingerprint sensors and a camera module for a sophisticated smart door lock system. Real-time security alerts and notifications are sent to user's mobile phones, ensuring immediate awareness and control over the security posture of their homes. Motion detection sensor detects motion and sends the instantaneous image to the user's telegram account. Home appliances are seamlessly connected through ESP32 devices, enabling effective communication and control within the smart home ecosystem. The development of this Virtual Smart Home Automation system is powered by Unity and Vuforia, serving as the primary tools for AR development. These technologies contribute to creating a dynamic and immersive control environment. To identify the room temperature and humidity DHT11 sensor is used. Along with the hardware side, a user interface is created which provides a better user experience and better interaction. </em>
APA, Harvard, Vancouver, ISO, and other styles
25

Stanislav, Bushuev. "AUTOMATION OF DATABASE ADMINISTRATION TASKS." Deutsche internationale Zeitschrift für zeitgenössische Wissenschaft 98 (February 22, 2025): 78–82. https://doi.org/10.5281/zenodo.14911034.

Full text
Abstract:
This article explores modern approaches to database administration automation, focusing on improving reliability, performance, and operational efficiency. Key administrative tasks such as monitoring, backup, migration management, and security are analyzed, along with essential tools including Zabbix, Nagios, Flyway, Oracle RMAN, and MySQL. The study highlights the major challenges of automation, such as compatibility, change management, and staff training, and proposes practical solutions to address them. The article emphasizes that automation reduces labor costs, minimizes human error, and contributes to the development of a resilient digital infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
26

Khedkar, Samruddhi S., and Prof. D. G. Ingale. "Automated Penetration Testing." International Journal of Ingenious Research, Invention and Development (IJIRID) 5, no. 3 (2024): 299–305. https://doi.org/10.5281/zenodo.13988309.

Full text
Abstract:
Automated penetration testing has emerged as a critical tool in the cyber security landscape, offering the ability to rapidly identify and address vulnerabilities within increasingly complex network infrastructures. This seminar report explores the development and application of automated penetration testing tools, which streamline traditional, labor-intensive processes by leveraging automation to conduct thorough security assessments. The report delves into various automated tools and frameworks, such as Metasploit, Burp Suite, and OpenVAS, and examines their methodologies, capabilities, and limitations. By analyzing both the advantages and disadvantages of automation in penetration testing, this report highlights the efficiency gains in vulnerability detection and the potential pitfalls, such as false positives and the limited scope of predefined attack scenarios. The integration of artificial intelligence and machine learning into automated testing is also discussed, emphasizing its role in enhancing the adaptability and accuracy of these tools. While automation significantly improves the speed and scalability of penetration testing, it is not a replacement for human expertise. The conclusion underscores the importance of combining automated tools with manual testing to ensure comprehensive security coverage, especially as cyber threats continue to evolve.
APA, Harvard, Vancouver, ISO, and other styles
27

Palit, Romit, and Dr Saurabh Solanki. "Automation in Infrastructure Tools for New Service Integration." International Journal of Research in Humanities and Social Sciences 13, no. 3 (2025): 191–211. https://doi.org/10.63345/ijrhs.net.v13.i3.11.

Full text
Abstract:
In today’s rapidly evolving technological landscape, the integration of new services demands a dynamic and resilient infrastructure that can adapt to changing business requirements with minimal disruption. Automation in infrastructure tools has emerged as a key enabler in this context, streamlining the deployment, configuration, and management processes while reducing the potential for human error. This paper examines the role of automation in facilitating new service integration, focusing on methodologies such as Infrastructure as Code (IaC), continuous integration/continuous deployment (CI/CD) pipelines, and container orchestration. By leveraging these automation techniques, organizations can achieve enhanced scalability, improved operational consistency, and reduced time-to-market for new services. The discussion further highlights challenges such as maintaining security, ensuring compatibility with legacy systems, and managing the complexity of automated environments. Overall, the integration of automation in infrastructure management not only supports a more agile service deployment framework but also paves the way for sustained innovation and operational excellence in the digital era.
APA, Harvard, Vancouver, ISO, and other styles
28

Sabeeruddin, shaik. "The Growing Role of Security Orchestration, Automation and Response (SOAR) in SOC Operations." International Journal of Leading Research Publication 5, no. 12 (2024): 1–6. https://doi.org/10.5281/zenodo.14769600.

Full text
Abstract:
The increasing complexity of cyber threats demands advanced solutions for Security Operations Centers (SOCs). Security Orchestration, Automation, and Response (SOAR) has emerged as a crucial technology for enhancing SOC operations by integrating diverse security tools, automating repetitive tasks, and optimizing incident response workflows. This paper investigates the expanding role of SOAR in SOCs, emphasizing its advantages, applications, and influence on cybersecurity efficacy. By examining the challenges encountered by SOCs and how SOAR mitigates these issues, this research highlights the necessity of adopting SOAR technologies for enhanced operational resilience against evolving threats. Additionally, it analyzes emerging trends and future advancements in SOAR to assist organizations in adapting to a swiftly changing threat landscape.
APA, Harvard, Vancouver, ISO, and other styles
29

Madamanchi, Sambasiva Rao. "Modern Approaches to Unix Automation: Shell Scripting, Configuration Management, and Security." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 3190–201. https://doi.org/10.22214/ijraset.2025.72773.

Full text
Abstract:
This study examines key scripting methodologies essential for automating Unix system administration within modern IT infrastructures. As systems grow in complexity, automation becomes crucial for achieving consistency, scalability, and reliability. The study explores Unix shell environments including Bash, sh, and zsh, and introduces foundational scripting elements such as syntax, control flow, I/O redirection, and execution permissions. It highlights practical applications in user account management, backups, monitoring, and software deployment, supported by real world examples. Scheduling mechanisms such as cron, at, and systemd timers are discussed, along with robust practices for logging, modular design, and error handling. Advanced scripting concepts including parameter parsing, exit code evaluation, and text processing with grep, awk, and sed are covered. The integration of Python and Perl, as well as the role of configuration management tools like Ansible and Puppet, are also examined. Security considerations such as input validation and auditing are emphasized. This study concludes by addressing limitations and emerging trends in AI driven automation.
APA, Harvard, Vancouver, ISO, and other styles
30

Upadhyay, Aditya. "Project Sleuth: A Comprehensive All-in-One Bug Bounty Automation Tool." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 3198–203. https://doi.org/10.22214/ijraset.2025.68072.

Full text
Abstract:
Project Sleuth is a comprehensive cybersecurity tool designed to automate and streamline the process of bug hunting and reconnaissance. The tool integrates a range of techniques, including subdomain enumeration, credential brute-forcing, network scanning, CVE testing, and OSINT (Open-Source Intelligence) gathering. Its primary purpose is to assist ethical hackers and cybersecurity analysts in identifying vulnerabilities across diverse targets, accelerating vulnerability assessment and penetration testing processes. By combining multiple recon tools into a cohesive workflow, Project Sleuth simplifies complex security testing tasks, enabling users of varying technical skill levels to efficiently identify and address security risks. The tool also offers flexibility and modularity, allowing users to customize the recon modules according to specific needs. Future enhancements to the project may include integration of machine learning to prioritize vulnerabilities based on risk and cloud-specific security features to broaden its applicability. Overall, Project Sleuth aims to provide a powerful and accessible solution for proactive cybersecurity efforts, highlighting the importance of automation in securing modern digital assets.
APA, Harvard, Vancouver, ISO, and other styles
31

Aakarsh Mavi. "Bridging the Gap: Cybersecurity Automation for Legacy Manufacturing Systems." Journal of Information Systems Engineering and Management 10, no. 30s (2025): 21–33. https://doi.org/10.52783/jisem.v10i30s.4768.

Full text
Abstract:
Legacy manufacturing systems play a big role in industrial production, but they usually don’t have strong cyber- security measures in place, which makes them easy targets for modern cyber threats. Because these systems are often outdated, they present serious security risks, as they weren’t built to defend against today’s cyber-attacks. This study aims to fill the cybersecurity gap in legacy manufacturing environments by creating automated tools that boost the security of these systems without needing a lot of hands-on work. The frame- work includes automated patch management and vulnerability scanning tools, making sure that important security updates are consistently applied to legacy systems. This helps reduce the risk of hackers exploiting any unpatched vulnerabilities. What’s more, the research also uses network segmentation and anomaly detection technologies. These strategies help keep critical legacy systems separate from the wider network and watch for any unusual activity that could signal a cyber-attack. By combining, these approaches it helps to stop legacy systems from being compromised and used as gateways for cybercriminals. Not only does this strengthen the overall security setup, but it also minimizes operational hiccups, making sure both system uptime and security stay strong. By automating these processes, this research offers a scalable, effective, and sustainable way to protect legacy manufacturing systems from developing cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
32

Yankson, Benjamin, Tyler Loucks, Andrea Sampson, and Chelsea Lojano. "Robots Security Assessment and Analysis Using Open-Source Tools." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 449–56. http://dx.doi.org/10.34190/iccws.18.1.1019.

Full text
Abstract:
The Internet of things (IoT) has revolutionized many aspects of the world, including industrial systems, automobiles, home automation, and surveillance, to name a few. IoT has offered a multitude of conveniences for our daily lives, such as being able to control our thermostats remotely, view our home surveillance cameras while away, or have a smart television that can surf the web. However, the widespread adoption of IoT devices combined with their vast device vulnerabilities results in significant security risks reinforcing the need for more robust default security controls and public awareness. As such, this paper aims to discover and document security vulnerabilities in the Asus Zenbo Junior IoT robot, along with providing a few best practices when securing smart home devices. This work presents an experiment using several security vulnerability assessment tools such as Nmap and OpenVAS scans to assess cybersecurity vulnerability currently present on Zenbo based on the 4P forensic investigative framework. The result of the experiment shows multiple open ports were discovered, along with miscellaneous information that an attacker could use to their advantage to attack the Zenbo robot. Based on the result, this work presents various security precautions that can help users protect against cyber-attack.
APA, Harvard, Vancouver, ISO, and other styles
33

Rusetskaya, Irina A. "COMPLIANCE IN INFORMATION SECURITY." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 2 (2023): 70–80. http://dx.doi.org/10.28995/2686-679x-2023-2-70-80.

Full text
Abstract:
The article is about studying the main approaches to the organization of compliance in solving the issues of ensuring information security. It analyzes the concept of compliance and its main components. Considering the system of compliance functions, the author also analyzes the categories of norms and requirements that underlie the implementation of compliance functions, as well as examples of legal and regulatory documents in the field of information security compliance. There are notes on features of the modern development of compliance in Russia in various fields. The main tasks of compliance control in the field of information security in Russian organizations are considered. Areas are identified in which the implementation of compliance functions is especially significant. The article considers that the information protection can be ensured by using compliance techniques, as well as the necessary tools used for that. The author pays special attention to the issues of compliance automation, and the analysis of the tools that can be used for that. The article discusses the advantages of automated compliance over the traditional one, as well as examples of existing developments in the field of compliance automation. The author of the article also considers the factors indicating the presence of a developed compliance system in the company, as well as the importance of those factors in ensuring the information security of organizations
APA, Harvard, Vancouver, ISO, and other styles
34

Dr., Anitha S., and D. Pravishka. "Intelligent Automation Framework for Penetration Testing and Security Assessment." Research and Reviews: Advancement in Cyber Security 2, no. 3 (2025): 39–45. https://doi.org/10.5281/zenodo.15583371.

Full text
Abstract:
<em>As cyber threats grow in complexity and frequency, the need for efficient, continuous security assessment is critical. Traditional penetration testing is often time-consuming, manual, and resource-intensive. This paper presents a modular Automated Penetration Testing Framework that automates key phases namely reconnaissance, scanning, vulnerability detection, exploitation, and reporting using open-source tools and rule-based logic. The framework reduces human error, improves test consistency, and supports real-time reporting, making it ideal for dynamic and resource-constrained environments. It also offers adaptability across various infrastructures and paves the way for future AI integrations to enhance threat detection and response.</em>
APA, Harvard, Vancouver, ISO, and other styles
35

Chatterjee, Pushpalika, and Apurba Das. "Enhancing Software Security: A Research-Driven Automation Framework." International Journal of Scientific Research and Management (IJSRM) 12, no. 12 (2024): 1793–803. https://doi.org/10.18535/ijsrm/v12i12.ec03.

Full text
Abstract:
With the ever-growing dependency on software in critical systems such as healthcare, finance, transportation, and defense, among many others, the need for robust security in software has never been greater. Breaches of security, in which an undetected vulnerability was often the culprit, lead to severe financial loss, loss of reputation, and even legal action for organizations and end-users. While technology has considerably improved, conventional security practices have repeatedly have failed to address the rapid growth of complexity and dynamic nature in modern software systems. The paper presents a critical requirement for an organized and active approach toward software security for its lifetime. We propose an automation framework driven by research that responds to these challenges by fitting into the tight cooperation of security testing tools in order to automate the detection and mitigation of vulnerabilities: it engenders a continuous improvement culture of security. This framework will be tailored to support Agile development and DevOps workflows, seamlessly embedding security in the rapid, iterative cycles of development. This framework will allow an organization to measure and improve quantitatively its security practices over time by harnessing actionable metrics and insight.
APA, Harvard, Vancouver, ISO, and other styles
36

Maksymovych, M., and L. Mychuda. "ROLE, PROBLEMS, AND METHODS OF SOFTWARE SECURITY TESTING AUTOMATION." Computer systems and network 6, no. 2 (2024): 131–41. https://doi.org/10.23939/csn2024.02.131.

Full text
Abstract:
In the modern world, where information security becomes a key element of any organization's operations, software security testing automation is more important than ever. The success of an application directly depends on its stability, reliability, and security, which makes the proper implementation of control mechanisms critical. The increase in cyber threats and the growing complexity of software systems make this topic even more relevant. The main role of automation is to provide quick and efficient detection of potential application vulnerabilities during its development phase. Despite its obvious advantages, several issues complicate the implementation of automated solutions, such as the complexity of configuration, high implementation and maintenance costs, lack of expertise in the field, lack of prioritization. This article examines the role of software security testing automation, challenges, methods, tools for testing, and ways to combine them for greater efficiency. Based on the analysis, an architectural solution is proposed that ensures quick, reliable, and regular security testing of the application at different stages of its lifecycle, significantly increasing the likelihood of its resistance to various vulnerabilities. Keywords: software, cybersecurity, automation, testing, containerization, protection.
APA, Harvard, Vancouver, ISO, and other styles
37

Sandhya, Guduru. "Automated Vulnerability Scanning & Runtime Protection for DockerKubernetes: Integrating Trivy, Falco, and OPA." Journal of Scientific and Engineering Research 6, no. 2 (2019): 216–20. https://doi.org/10.5281/zenodo.15234550.

Full text
Abstract:
Securing Docker and Kubernetes environments is a critical challenge. Automated vulnerability scanning and runtime protection are essential to mitigate security risks while maintaining performance and compliance. Tools like Trivy, Falco, and Open Policy Agent (OPA) provide a powerful, automated security framework for detecting vulnerabilities, monitoring runtime behavior, and enforcing security policies in Kubernetes environments. This paper explores the security challenges inherent in containerized deployments, highlighting common vulnerabilities, compliance gaps, and runtime threats. It evaluates the role of Trivy for continuous vulnerability scanning, Falco for real-time threat detection, and OPA for policy enforcement within Kubernetes clusters. Additionally, the study assesses infrastructure-as-code (IaC) frameworks such as Terraform for state management, Ansible for automated recovery, and AWS CloudFormation for disaster recovery automation. The integration of Chaos Engineering tools like Gremlin enables testing of recovery point objectives (RPO) and recovery time objectives (RTO) under real-world failure conditions, while real-time replication technologies like DRBD and Ceph enhance system resilience. We propose a comprehensive security framework that integrates these tools to create a robust, automated security posture for Kubernetes environments.
APA, Harvard, Vancouver, ISO, and other styles
38

Chirag, Amrutlal Pethad. "Design and Build a CI/CD pipeline for Salesforce." European Journal of Advances in Engineering and Technology 8, no. 6 (2021): 136–46. https://doi.org/10.5281/zenodo.13919671.

Full text
Abstract:
The document outlines the detailed steps to establish a robust CI/CD pipeline for Salesforce, integrate version control, automate testing, and deployment tools. It outlines the Salesforce Deployment capabilities, and its limitations. Key features of Jenkins, its benefits in implementing a CICD pipeline for Salesforce. Best practices include using scratch orgs for development, maintaining a clean codebase, implementing a branching strategy, and automating deployments with CI tools like Jenkins. Ensure security and compliance by managing credentials securely and reviewing permissions. Monitor deployments and foster collaboration through documentation and code reviews. A robust CICD implementation leads to higher quality releases, faster development cycles, and reduced risk of errors during deployment. It allows organizations to deliver high-quality features faster and more reliably, ultimately leading to better user satisfaction and business outcomes.
APA, Harvard, Vancouver, ISO, and other styles
39

Aakarsh Mavi. "Empowering HVAC Manufacturing with IT/OT Convergence for Operational Excellence." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 2500–2509. https://doi.org/10.32628/cseit24245475.

Full text
Abstract:
Information Technology (IT) and Operational Technology (OT) in manufacturing has opened up exciting opportunities for better efficiency and innovation, but it also brings some serious security risks. Since these systems were originally designed separately, they have different priorities and security controls, which can create vulnerabilities. This research looks into automating security audits in these IT/OT blended environments to boost the overall security of manufacturing operations. The goal here is to create systems that automatically check the security of both IT and OT environments, focusing on the unique vulnerabilities that pop up at their intersection. By simplifying how we identify and assess security risks, we’re aiming to close any gaps in communication and interaction between these systems. Plus, the research emphasizes needing automated solutions that quickly fix security weaknesses, helping to reduce the chances of cyber threats taking advantage of these vulnerabilities. This plan includes real-time monitoring, spotting anomalies, and automatic patching to ensure a swift and adaptable reaction to new security challenges. We’re looking to use the latest security automation tools, like those powered by AI and machine learning, to keep security measures fresh and developing as IT and OT systems change. By automating security audits, this work hopes to cut down on human mistakes, make security operations more efficient, and strengthen the defenses of IT/OT integrated environments against increasingly smart cyberattacks, finally offering a scalable approach for securing future manufacturing environments.
APA, Harvard, Vancouver, ISO, and other styles
40

Aakarsh Mavi. "Security Automation Framework for Digital Twins in Smart Manufacturing." Journal of Information Systems Engineering and Management 10, no. 33s (2025): 1088–98. https://doi.org/10.52783/jisem.v10i33s.5848.

Full text
Abstract:
Digital twin technology is shaking things up in the manufacturing world by creating realtime virtual copies of physical assets. But as this technology evolves, keeping these systems safe and secure is more important than ever. Digital twins work by constantly exchanging data between the real world and their virtual counterparts, which makes them a target for cyberattacks. If these attacks succeed, they can throw off the accuracy of the virtual models and disrupt manufacturing processes. This research looks into security automation solutions specifically for digital twin systems in manufacturing settings, prioritizing monitoring and defending against new cyber threats. We’re suggesting automated security tools that use anomaly detection algorithms to keep an eye on the data flowing into digital twins, allowing us to spot and react to any unusual or harmful activities in real-time. Plus, we’re introducing automated lockdown features that protect the digital twin environment by isolating any compromised components to stop further damage. The goal of this framework is to boost the security, accuracy, and reliability of digital twin systems, ensuring these innovative technologies can be used safely and effectively in critical manufacturing operations. This paper dives into the design, implementation, and challenges of securing digital twins in the manufacturing space and adds to the ongoing push to weave security automation into the Industry 4.0 framework.
APA, Harvard, Vancouver, ISO, and other styles
41

Muhammad, Tayyab, and Muhammad Munir. "Network Automation." European Journal of Technology 7, no. 3 (2023): 23–42. http://dx.doi.org/10.47672/ejt.1547.

Full text
Abstract:
Purpose: The article "Network Automation in the Contemporary Economy" explores the concepts and methods of effective network management. The application stack, Jinja template engine, automation architecture, Nornir inventory management, application flow, logging, debugging, and live code testing are just a few of the subjects it covers. Network administrators are more important as digital technologies evolve quickly in order to maintain a safe and dependable network connection. The purpose of this article is to give network administrators the information and abilities they need to successfully traverse the intricacies of network management. It starts by going through the application stack and explaining the roles and relationships between each layer. The Ninja template engine is then described, along with an explanation of how its potent grammar makes network configuration management simple.&#x0D; Methodology: The research design employed in this study is a combination of qualitative and quantitative approaches. It involved an extensive literature review to gather existing knowledge on network automation and management practices. Additionally, empirical data was collected through surveys and interviews with network administrators to understand their experiences, challenges, and perspectives on network automation.&#x0D; Findings: The study found that network automation offers numerous benefits, including increased efficiency, reduced human errors, and enhanced network security. The application stack was identified as a critical component of network architecture, and its proper management can significantly impact network performance. The Jinja template engine proved to be an effective tool for simplifying network configuration tasks and promoting standardization across the network infrastructure.&#x0D; Recommendations: To policymakers, we recommend investing in training programs and resources to equip network administrators with the necessary skills to implement and manage network automation effectively. Developing clear guidelines and standards for network automation can also help organizations adopt automation practices seamlessly.&#x0D; Theory: The study was informed by the "Network Automation Theory," which posits that automating network management tasks can streamline operations, enhance reliability, and free up human resources for more strategic initiatives. The theory suggests that proper implementation of automation tools and frameworks can lead to a more agile and resilient network infrastructure. The validation of the theory was achieved through empirical data collected from network administrators and their experiences with network automation. The findings aligned with the propositions of the theory, confirming that network automation indeed brings significant benefits to organizations.&#x0D; Policy: For policymakers, we propose the formulation of a comprehensive policy framework that encourages the adoption of network automation technologies. The policy should focus on providing financial incentives for businesses to invest in automation tools, fostering partnerships between government and private sectors to promote knowledge exchange, and establishing regulatory guidelines to ensure network security and data privacy in automated environments.&#x0D; Practice: To network administrators and practitioners, we recommend staying updated with the latest advancements in network automation technologies and tools. Investing time in training and upskilling can help practitioners gain expertise in using automation frameworks like Nornir and Jinja template engine. Additionally, fostering a culture of continuous learning and experimentation within organizations can lead to successful implementations of network automation practices.
APA, Harvard, Vancouver, ISO, and other styles
42

KUMAR, R. SENTHIL. "DevOps in 2025: Trends, Innovations, and the Path Ahead." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40564.

Full text
Abstract:
stract— DevOps, the combination of development and operations, has fundamentally transformed software delivery by fostering collaboration, automation, and continuous integration. As we approach 2025, the DevOps landscape is evolving rapidly, driven by advances in artificial intelligence (AI), machine learning (ML), cloud technologies, and automation tools. This paper explores the current state of DevOps, innovations shaping its future, and emerging trends that are likely to define DevOps practices in the coming years. We highlight the integration of AI/ML into DevOps pipelines, the rise of autonomous DevOps systems, and the increasing focus on security and governance in increasingly complex environments. Keywords—DevOps, 2025, AI/ML, automation, autonomous systems, security, cloud-native, DevSecOps.
APA, Harvard, Vancouver, ISO, and other styles
43

Rajarajeswari, S., Shola Usha Rani, Alpanshu Kataria, and Soumitro Dutta. "Home Automation through Smart Lighting, Smart Security and other Appliances." ITM Web of Conferences 37 (2021): 01024. http://dx.doi.org/10.1051/itmconf/20213701024.

Full text
Abstract:
The smart home automation system is designed to conveniently manage and monitor household appliances and lighting fixtures remotely, to save time and to use resources effectively. It is a control system for allowing access to home automation devices. The automation devices include lights, fan, camera and doors. It even enhances the main features of the project to control the home appliances from anywhere as remotely. With the camera module, continuous surveillance and protection of the home is accomplished. A significant improvement is achieved in utility costs by an optimal use of energy. Using inexpensive electronic and interactive tools, this initiative can be applied, making it economically, physically and operationally feasible. Basically it involves controlling everything remotely via a visual interface and mobile application. The automation system employs the use of MQTT protocol in order to secure the transmitted device based information to and from in the network. The defense against Man in the Middle attack (MITM) is the main focus of our automation system. The routed messages are checked at the intermediate hub to check for the occurrence of MITM based DoS attacks through manual reset points. .
APA, Harvard, Vancouver, ISO, and other styles
44

Trudy-Ann, Campbell, Eromonsei Samson, and Afolabi Olusegun. "Automated API framework tools for evaluating cloud resources (IAM, S3, KMS) for compliance with ISO 27001 case study AWS." Global Journal of Engineering and Technology Advances 20, no. 1 (2024): 131–49. https://doi.org/10.5281/zenodo.13694364.

Full text
Abstract:
CLOUD&mdash; computing's advancements has provided scalability and adaptability but has also given rise to data security concerns. ISO 27001 is vital for cloud information security, yet compliance in dynamic settings poses challenges. Automated API framework tools automate ISO 27001 compliance checks for IAM, S3, and KMS services in AWS, boosting efficiency and minimizing errors. This study investigates the effectiveness of these frameworks, focusing on AWS environments. It explores advantages, difficulties, and practical considerations of automation in cloud compliance. Insights aim to enhance understanding of how automation reinforces security and regulatory adherence. Previous studies highlight the need for adaptable monitoring solutions in cloud setups. Recent research demonstrates the potential of programming languages like Python to streamline compliance processes effectively. This study contributes by examining the efficiency of automated compliance frameworks in AWS, offering perspectives on their practical application in cloud settings.
APA, Harvard, Vancouver, ISO, and other styles
45

Lescisin, Michael, and Qusay H. Mahmoud. "Evaluation of Dynamic Analysis Tools for Software Security." International Journal of Systems and Software Security and Protection 9, no. 3 (2018): 34–59. http://dx.doi.org/10.4018/ijsssp.2018070102.

Full text
Abstract:
This article discusses the development of secure software by means of dynamic analysis tools. A secure software-based system should have security checks and balances integrated throughout its entire development lifecycle, including its deployment phase. Therefore, this article covers both using software security tools for testing code in development as well as monitoring code in deployment to ensure that it is operating securely. The security issues discussed in this article will be split into two categories – memory safety issues and input validation issues. Memory safety issues concern problems of unauthorized memory access such as buffer overflows, stack overflows, use-after-free, double-free, memory leaks, etc. Although not strictly a memory safety issue, concurrency issues, such as data races, will be considered as memory safety issues in this article. Input validation issues concern problems where untrusted input is directly passed to handlers which are designed to handle both data and commands. Examples of this include path traversal, SQL injection, command injection, JavaScript/HTML injection, etc. As a result of this significant difference between these two types of security vulnerabilities, two sets of tools are evaluated with one set focusing on memory safety issues and the other on input validation issues. This article explores the benefits and limitations of current software dynamic analysis tools by evaluating them against both the authors test cases as well as the OWASP Benchmark for Security Automation and proposes solutions for implementing secure software applications.
APA, Harvard, Vancouver, ISO, and other styles
46

Manoj, Kodali. "Smart Home Automation." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45582.

Full text
Abstract:
Abstract - The Cadio application is a smart home automation solution that combines IoT technology with AI-powered tools to provide seamless management and monitoring of household equipment. It provides multi-mode management using voice commands with Google Assistant or Amazon Alexa, allowing users to operate appliances locally or remotely via the internet. The solution works with both local Wi-Fi networks and the Cadio cloud, delivering excellent connection stability and quick reaction times. The Cadio app allows users to plan activities or set timers for autonomous appliance operation, and it may be paired with sensors to provide dynamic reactions based on environmental conditions. The platform generates code using AI, allowing users to setup devices without prior programming knowledge. The system also has safe and dependable security measures, such as pin-code security and EEPROM technology for memory retention after power outages. Cadio is easy to use, inexpensive, and adaptable, making it an excellent choice for both new and experienced users. It integrates with Google Home and Amazon Alexa for improved interoperability and offers offline functioning via manual switches, assuring reliability even during network disruptions. Overall, the Cadio app demonstrates recent improvements in home automation by combining simplicity and power. Key Words: CADIO Home Automation Application, Internet of Things (IoT), ESP8266, Wireless Control, Remote Monitoring, Automation System, Smart Devices, Mobile App, Voice Control Integration, Mobile User Interface.
APA, Harvard, Vancouver, ISO, and other styles
47

Laxminarayana, Korada, Kartik Sikha Vijay, and Siramgari Dayakar. "Streamlining Enterprise Cybersecurity: Building Real-Time Threat Analytics Solutions." European Journal of Advances in Engineering and Technology 7, no. 12 (2020): 107–11. https://doi.org/10.5281/zenodo.13762555.

Full text
Abstract:
The proliferation of cybersecurity tools in enterprises has led to an overwhelming complexity in managing and responding to security threats. Since the 1990s, as organizations have increasingly invested in cybersecurity to combat growing threats and sophisticated attacks, they have accumulated a vast array of tools designed to address various aspects of their security needs. This accumulation has resulted in a fragmented security landscape where the effectiveness of individual tools is often undermined by their lack of integration. This paper explores the challenges associated with managing a multitude of cybersecurity tools and examines the emerging solutions aimed at providing near real-time threat analytics. Case studies of industry leaders such as Splunk, Microsoft Azure Sentinel, and LogRhythm illustrate how automation and advanced analytics are addressing these challenges. Additionally, the paper discusses the complexities and benefits of in-house solutions with open-source tools and the role of artificial intelligence in enhancing enterprise security. By integrating these approaches, organizations can improve their security posture, streamline their operations, and better manage their cybersecurity investments. <em>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </em>
APA, Harvard, Vancouver, ISO, and other styles
48

Taiwo Joseph Akinbolaji, Godwin Nzeako, David Akokodaripon, and Akorede Victor Aderoju. "Automation in Cloud-Based DevOps: A Guide to CI/CD Pipelines and Infrastructure as Code (IaC) with Terraform and Jenkins." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 090–104. http://dx.doi.org/10.30574/wjaets.2024.13.2.0542.

Full text
Abstract:
This study offers a comprehensive analysis of automation in cloud-based DevOps, focusing on the role of Continuous Integration/Continuous Delivery (CI/CD) pipelines and Infrastructure as Code (IaC) in streamlining software development processes. Employing tools like Jenkins and Terraform, the research aims to demonstrate how automation can significantly enhance operational efficiency, scalability, and security in cloud deployments. Through a detailed examination of CI/CD components and their integration with IaC, this paper identifies key findings, including the reduction of manual errors, improved deployment consistency across environments, and enhanced security through DevSecOps practices. The study further explores challenges such as configuration complexity and compliance, proposing best practices like proactive monitoring, encrypted secrets management, and version control to mitigate these issues. Conclusively, the research recommends the adoption of AI-driven analytics and robust security frameworks to optimize cloud-based CI/CD automation. This work not only highlights current methodologies but also anticipates future trends, providing a strategic roadmap for organizations aiming to leverage DevOps automation effectively.
APA, Harvard, Vancouver, ISO, and other styles
49

Arjun Kumar Paruchuri. "Identity-first security architecture: Leveraging Microsoft Entra ID and Intelligent automation for enterprise digital transformation." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 1539–46. https://doi.org/10.30574/wjaets.2025.15.3.1051.

Full text
Abstract:
The evolution of enterprise security architectures has shifted from traditional network perimeter defenses to identity-centric models that recognize users, devices, and contextual signals as primary security boundaries. Microsoft's integrated cloud ecosystem, Entra ID, Power Platform, and Microsoft Defender, exemplifies this transformation by establishing identity as the foundational control plane for security and operational automation. This convergence enables organizations to implement dynamic Conditional Access policies that adapt to real-time risk assessments while simultaneously orchestrating complex business workflows through Power Automate and AI Builder. Integrating cognitive services and machine learning capabilities within these platforms facilitates intelligent document processing, automated threat response, and predictive security measures that scale with organizational complexity. By unifying identity governance with process automation, enterprises achieve enhanced security postures while reducing manual operational overhead through automated employee lifecycle management, risk-based approval workflows, and AI-driven compliance monitoring. The synergy between identity management and intelligent automation represents a fundamental shift in how organizations conceptualize and implement digital transformation strategies, moving beyond siloed security tools toward holistic, adaptive systems that respond dynamically to emerging threats and business requirements.
APA, Harvard, Vancouver, ISO, and other styles
50

Putra, Wahyu Riski Aulia, Agus Reza Aristiadi Nurwa, Dimas Febriyan Priambodo, and Muhammad Hasbi. "Infrastructure as Code for Security Automation and Network Infrastructure Monitoring." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 22, no. 1 (2022): 201–14. http://dx.doi.org/10.30812/matrik.v22i1.2471.

Full text
Abstract:
The Corona Virus (COVID-19) pandemic that has spread throughout the world has created a new work culture, namely working remotely by utilizing existing technology. This has the effect of increasing crime and cyber attacks as more and more devices are connected to the internet for work. Therefore, the priority on security and monitoring of network infrastructure should be increased. The security and monitoring of this infrastructure requires an administrator in its management and configuration. One administrator can manage multiple infrastructures, making the task more difficult and time-consuming. This research implements infrastructure as code for security automation and network infrastructure monitoring including IDS, honeypot, and SIEM. Automation is done using ansible tools to create virtual machines to security configuration and monitoring of network infrastructure automatically. The results obtained are automation processes and blackbox testing is carried out and validation is carried out using a User Acceptance Test to the computer apparatus of the IT Poltek SSN Unit to prove the ease of the automation carried out. Based on the results of the UAT, a score of 154 was obtained in the Agree area with an acceptance rate of 81.05% for the implementation of infrastructure as code for the automation carried out
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!