Security Risk Scoring Incorporating Computers' Environment

Abstract

A framework of a Continuous Monitoring System (CMS) is presented, having new improved capabilities. The system uses the actual real-time configuration of the system and environment characterized by a Configuration Management Data Base (CMDB) which includes detailed information of organizational database contents, security and privacy specifications. The Common Vulnerability Scoring Systems' (CVSS) algorithm produces risk scores incorporating information from the CMDB. By using the real updated environmental characteristics the system enables achieving accurate scores compared to existing practices. Framework presentation includes systems' design and an illustration of scoring computations.

Authors and Affiliations

Eli Weintraub

Keywords

Related Articles

Facial Expression Recognition using Hybrid Texture Features based Ensemble Classifier

Communication is fundamental to humans. In the literature, it has been shown through many scientific research studies that human communication ranges from 54 to 94 percent is non-verbal. Facial expressions are the most o...

Academic Emotions Affected by Robot Eye Color: An Investigation of Manipulability and Individual-Adaptability

We investigate whether academic emotions are affected by the color of a robot’s eyes in lecture behaviors. In conventional human-robot interaction research on robot lecturers, the emphasis has been on robots assisting or...

An Effective Storage Mechanism for High Performance Computing (HPC)

All over the process of treating data on HPC Systems, parallel file systems play a significant role. With more and more applications, the need for high performance Input-Output is rising. Different possibilities exist: G...

Evaluation of Different Hypervisors Performance in the Private Cloud with SIGAR Framework

To make cloud computing model Practical and to have essential characters like rapid elasticity, resource pooling, on demand access and measured service, two prominent technologies are required. One is internet and second...

Key Schedule Algorithm using 3-Dimensional Hybrid Cubes for Block Cipher

A key scheduling algorithm is the mechanism that generates and schedules all session-keys for the encryption and decryption process. The key space of conventional key schedule algorithm using the 2D hybrid cubes is not e...

Download PDF file
  • EP ID EP138617
  • DOI 10.14569/IJACSA.2016.070423
  • Views 95
  • Downloads 0

How To Cite

Eli Weintraub (2016). Security Risk Scoring Incorporating Computers' Environment. International Journal of Advanced Computer Science & Applications, 7(4), 183-189. https://europub.co.uk/articles/-A-138617