Security Risk Scoring Incorporating Computers' Environment

Abstract

A framework of a Continuous Monitoring System (CMS) is presented, having new improved capabilities. The system uses the actual real-time configuration of the system and environment characterized by a Configuration Management Data Base (CMDB) which includes detailed information of organizational database contents, security and privacy specifications. The Common Vulnerability Scoring Systems' (CVSS) algorithm produces risk scores incorporating information from the CMDB. By using the real updated environmental characteristics the system enables achieving accurate scores compared to existing practices. Framework presentation includes systems' design and an illustration of scoring computations.

Authors and Affiliations

Eli Weintraub

Keywords

Related Articles

Performance Comparison between Merge and Quick Sort Algorithms in Data Structure

In computer science field, one of the basic operation is sorting. Many sorting operations use intermediate steps. Sorting is the procedure of ordering list of elements in ascending or descending with the help of key valu...

Micro Agent and Neural Network based Model for Data Error Detection in a Real Time Data Stream

In this paper, we present a model for learning and detecting the presence of data type errors in a real time big data stream processing context. The proposed approach is based on a collection of micro-agents. Each micro-...

Method for Thermal Pain Level Prediction with Eye Motion using SVM

Method for thermal pain level prediction with eye motion using SVM is proposed. Through experiments, it is found that thermal pain level is much sensitive to the change rate of pupil size rather than pupil size itself. A...

  Skew correction for Chinese character using Hough transform

 Chinese Handwritten character recognition is an emerging field in Computer Vision and Pattern Recognition. Documents acquired through Scanner, Mobile or Camera devices are often prone to Skew and Correction of skew...

A Survey on Models and Query Languages for Temporally Annotated RDF

In this paper, we provide a survey on the models and query languages for temporally annotated RDF. In most of the works, a temporally annotated RDF ontology is essentially a set of RDF triples associated with temporal co...

Download PDF file
  • EP ID EP138617
  • DOI 10.14569/IJACSA.2016.070423
  • Views 113
  • Downloads 0

How To Cite

Eli Weintraub (2016). Security Risk Scoring Incorporating Computers' Environment. International Journal of Advanced Computer Science & Applications, 7(4), 183-189. https://europub.co.uk/articles/-A-138617