Evaluating Damage Potential in Security Risk Scoring Models

Abstract

A Continuous Monitoring System (CMS) model is presented, having new improved capabilities. The system is based on the actual real-time configuration of the system. Existing risk scoring models assume damage potential is estimated by systems' owner, thus rejecting the information relying in the technological configuration. The assumption underlying this research is based on users' ability to estimate business impacts relating to systems' external interfaces which they use regularly in their business activities, but are unable to assess business impacts relating to internal technological components. According to the proposed model systems' damage potential is calculated using technical information on systems' components using a directed graph. The graph is incorporated into the Common Vulnerability Scoring Systems' (CVSS) algorithm to produce risk scoring measures. Framework presentation includes system design, damage potential scoring algorithm design and an illustration of scoring computations.

Authors and Affiliations

Eli Weintraub

Keywords

Related Articles

A Systematic Report on Issue and Challenges during Requirement Elicitation

We say that researchers made a lot of contribution in requirement engineering by introducing many helpful tools and efficient methods for Requirement Engineering (RE) but simultaneously this field demands more research t...

Improving Web Page Prediction Using Default Rule Selection

Mining user patterns of web log files can provide significant and useful informative knowledge. A large amount of research has been done in trying to predict correctly the pages a user will most likely request next. Mark...

Access Control Model for Modern Virtual e-Government Services: Saudi Arabian Case Study

e-Government services require intensive information exchange and interconnection among governmental agencies to provide specialized online services and allow informed decision-making. This could compromise the integrity,...

TSAN: Backbone Network Architecture for Smart Grid of P.R China

Network architecture of any real-time system must be robust enough to absorb several network failures and still work smoothly. Smart Grid Network is one of those big networks that should be considered and designed carefu...

Indirect Substitution Method in Combinable Services by Eliminating Incompatible Services

Service-oriented architecture is a style in information systems architecture with the aim of achieving loose coupling in communication between software components and services. Service, here means software implementation...

Download PDF file
  • EP ID EP149250
  • DOI 10.14569/IJACSA.2016.070547
  • Views 94
  • Downloads 0

How To Cite

Eli Weintraub (2016). Evaluating Damage Potential in Security Risk Scoring Models. International Journal of Advanced Computer Science & Applications, 7(5), 345-353. https://europub.co.uk/articles/-A-149250