Evaluating Damage Potential in Security Risk Scoring Models
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 5
Abstract
A Continuous Monitoring System (CMS) model is presented, having new improved capabilities. The system is based on the actual real-time configuration of the system. Existing risk scoring models assume damage potential is estimated by systems' owner, thus rejecting the information relying in the technological configuration. The assumption underlying this research is based on users' ability to estimate business impacts relating to systems' external interfaces which they use regularly in their business activities, but are unable to assess business impacts relating to internal technological components. According to the proposed model systems' damage potential is calculated using technical information on systems' components using a directed graph. The graph is incorporated into the Common Vulnerability Scoring Systems' (CVSS) algorithm to produce risk scoring measures. Framework presentation includes system design, damage potential scoring algorithm design and an illustration of scoring computations.
Authors and Affiliations
Eli Weintraub
A Systematic Report on Issue and Challenges during Requirement Elicitation
We say that researchers made a lot of contribution in requirement engineering by introducing many helpful tools and efficient methods for Requirement Engineering (RE) but simultaneously this field demands more research t...
Improving Web Page Prediction Using Default Rule Selection
Mining user patterns of web log files can provide significant and useful informative knowledge. A large amount of research has been done in trying to predict correctly the pages a user will most likely request next. Mark...
Access Control Model for Modern Virtual e-Government Services: Saudi Arabian Case Study
e-Government services require intensive information exchange and interconnection among governmental agencies to provide specialized online services and allow informed decision-making. This could compromise the integrity,...
TSAN: Backbone Network Architecture for Smart Grid of P.R China
Network architecture of any real-time system must be robust enough to absorb several network failures and still work smoothly. Smart Grid Network is one of those big networks that should be considered and designed carefu...
Indirect Substitution Method in Combinable Services by Eliminating Incompatible Services
Service-oriented architecture is a style in information systems architecture with the aim of achieving loose coupling in communication between software components and services. Service, here means software implementation...