Drexel University

College of Computing and Informatics

Vulnerability Alert Notification System

IT / Computer Security
A vulnerability alert system that can be used by security experts to stay current on emerging threats and vulnerabilities to improve information security and mitigation efforts. Visit https://vans.titanite.me/vans/register.php to create an account with VANS today!
One of the many challenges being faced in technology today are the numerous threats and vulnerabilities being encountered with on-premise, enterprise, and cloud systems. Specifically, those targeting web sites, applications, databases, networks, infrastructure, appliances and the gamut of IoT devices. Since 60% of data breaches take several weeks to be identified (O'Driscoll, 2022), security experts face immense pressure to prevent data breaches and develop proactive mitigation strategies in a timely manner. When an organization falls victim to a cybersecurity attack, they will have to deal with the immediate monetary impact in addition to the reputational impact that will reduce consumer confidence in their product and the ability to protect sensitive information. 

VANS provides security experts with the ability to monitor and stay current with the latest threat and vulnerability data from a variety of sources fused into one aggregate feed. Users can utilize the VANS Web Portal to search or filter for threats and vulnerabilities by keywords, products or vendors. Furthermore, by leveraging the embedded automation awareness tools, VANS allows users to subscribe to receiving timely notifications on targeted threats and vulnerabilities via email or push notification on the Android app. Through data visualization tools, VANS will further expand its capabilities providing real-time threat and vulnerability statistics to its user base. In an effort to preemptively mitigate and establish a proactive security posture, it has become necessary to collate and consolidate data security intelligence from a number of reputable disclosed security sources into one database. The identification of relevant threats and vulnerabilities can improve efforts to prioritize mitigation and patch strategies.
...
...

Team Members

...
...