Evaluating Damage Potential in Security Risk Scoring Models

Abstract

A Continuous Monitoring System (CMS) model is presented, having new improved capabilities. The system is based on the actual real-time configuration of the system. Existing risk scoring models assume damage potential is estimated by systems' owner, thus rejecting the information relying in the technological configuration. The assumption underlying this research is based on users' ability to estimate business impacts relating to systems' external interfaces which they use regularly in their business activities, but are unable to assess business impacts relating to internal technological components. According to the proposed model systems' damage potential is calculated using technical information on systems' components using a directed graph. The graph is incorporated into the Common Vulnerability Scoring Systems' (CVSS) algorithm to produce risk scoring measures. Framework presentation includes system design, damage potential scoring algorithm design and an illustration of scoring computations.

Authors and Affiliations

Eli Weintraub

Keywords

Related Articles

AUTOMATED EDGE DETECTION USING CONVOLUTIONAL NEURAL NETWORK

The edge detection on the images is so important for image processing. It is used in a various fields of applications ranging from real-time video surveillance and traffic management to medical imaging applications. Curr...

Database Preservation: The DBPreserve Approach

In many institutions relational databases are used as a tool for managing information related to day to day activities. Institutions may be required to keep the information stored in relational databases accessible becau...

Eye Controlled Mobile Robot with Shared Control for Physically Impaired People

Physically impaired and disabled people are an integral part of human society. Devices providing assistance to such individuals can help them contribute to the society in a more productive way. The situation is even wors...

DLBS: Decentralize Load-Balance Scheduling Algorithm for Real-Time IoT Services in Mist Computing

Internet of Things (IoT) has been industrially investigated as Platforms as a Services (PaaS). The naive design of these types of services is to join the classic centralized Cloud computing infrastructure with IoT servic...

Brain Signal Classification using Genetic Algorithm for Right-Left Motion Pattern

Brain signals or EEG are non-stationary signals and are difficult to analyze visually. The brain signal has five waves alpha, beta, delta, gamma, and theta. The five waves have their frequency to describe the level of at...

Download PDF file
  • EP ID EP149250
  • DOI 10.14569/IJACSA.2016.070547
  • Views 109
  • Downloads 0

How To Cite

Eli Weintraub (2016). Evaluating Damage Potential in Security Risk Scoring Models. International Journal of Advanced Computer Science & Applications, 7(5), 345-353. https://europub.co.uk/articles/-A-149250