o Requires attention: The sub-point inside this metric could be a metric that can be called Requires Immediate attention. Not all the malicious software trying to access the system are of level 10 danger. Some programs are more dangerous …show more content…
Also, very beneficial to the users since they keep track of the code without ever executing it. Since mostly the analysis is performed on source code, it helps the tool and thus the user to know of problems beforehand. Any updates made to the source code will also be checked. Real time updates can be done whenever new code is checked by the tool. If issues are found in the source code, the user will be notified and then make the required changes.
• Network and memory activity indicator: This metric keeps track of the network and memory usage of the system. The users need these metrics because knowing the memory of programs in a system is very important. This metric will not be extremely active. It will keep checking the network and memory activity of the system at a periodically consistent time. But if there is a memory leak or very high memory usage, it will notify the user of a certain program which is the cause. Similarly, only when the network activity suddenly peaks or suddenly drops, the user will be …show more content…
The system will not like it if the user enters a string in an integer field. Letting the user know of programs which don’t involve validating their fields could result in unsafe programs being generated. So this tool will then check the programs for validation of inputs and then notify the user. The user then gets to decide whether to give access to the tools to make the changes or does the user want to make the changes itself. o Privilege levels: Although not directly related, this is not a very important check that needs to have a metric of its own. But users’ needs to be told of the different privileges of other users and programs by the system. Although, this is not expected to be a very active metric, there could be instances where other users are accessing something that they have not been given permission for.
• Vulnerability trends: This metric could detect patterns among programs that are vulnerable to attacks. This metric could analyze the previous programs that became malicious and based on that could from a pattern regarding how frequently programs turn malicious, programs are vulnerable etc. There is no pressing need for real time updates in this metric since this metric is to be treated as a means to assist the user in checking