Security Risk Scoring Incorporating Computers' Environment

Abstract

A framework of a Continuous Monitoring System (CMS) is presented, having new improved capabilities. The system uses the actual real-time configuration of the system and environment characterized by a Configuration Management Data Base (CMDB) which includes detailed information of organizational database contents, security and privacy specifications. The Common Vulnerability Scoring Systems' (CVSS) algorithm produces risk scores incorporating information from the CMDB. By using the real updated environmental characteristics the system enables achieving accurate scores compared to existing practices. Framework presentation includes systems' design and an illustration of scoring computations.

Authors and Affiliations

Eli Weintraub

Keywords

Related Articles

A New Approach for Leukemia Identification based on Cepstral Analysis and Wavelet Transform

This paper implements a new leukemia identification method which depends on Mel frequency cepstral coefficient (MFCC) feature extraction and wavelet transform. Leukemia identification is a measurement of blood cell featu...

On the Parallel Design and Analysis for 3-D ADI Telegraph Problem with MPI

In this paper we describe the 3-D Telegraph Equation (3-DTEL) with the use of Alternating Direction Implicit (ADI) method on Geranium Cadcam Cluster (GCC) with Message Passing Interface (MPI) parallel software. The algor...

 A Framework for Improving the Performance of Ontology Matching Techniques in Semantic Web

 Ontology matching is the process of finding correspondences between semantically related entities of different ontologies. We need to apply this process to solve the heterogeneity problems between different ontolog...

ECG Abnormality Detection Algorithm

The monitoring and early detection of abnormalities in the cardiac cycle morphology have significant impact on the prevention of heart diseases and their associated complications. Electrocardiogram (ECG) is very effectiv...

ASYNCHRONOUS CHECKPOINTING AND OPTIMISTIC MESSAGE LOGGING FOR MOBILE AD HOC NETWORKS 

In recent years the advancements in wireless communication technology and mobile computing fueled a steady increase in both number and types of applications for wireless networks. Wireless networks can roughly be classif...

Download PDF file
  • EP ID EP138617
  • DOI 10.14569/IJACSA.2016.070423
  • Views 87
  • Downloads 0

How To Cite

Eli Weintraub (2016). Security Risk Scoring Incorporating Computers' Environment. International Journal of Advanced Computer Science & Applications, 7(4), 183-189. https://europub.co.uk/articles/-A-138617