2015 IEEE 5th International Conference on Electronics Information and Emergency Communication 2015
DOI: 10.1109/iceiec.2015.7284502
|View full text |Cite
|
Sign up to set email alerts
|

Study on the distribution of CVSS environmental score

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…Using the work hour ranges mentioned above, the vulnerability repair time (T FIX ) was divided into three subcategories in consideration of the number of hours required for repair: T FIX MAX represents the maximum number of work hours required to fix one vulnerability and was assumed to be equal to 9 h; T FIX AVERAGE is the average number of work hours required to fix one vulnerability and was assumed equal to 4.5 h; T FIX MI N is the minimum number of work hours and is assumed equal to 1 h. Then, the equations that were used to estimate the number of work hours required to improve the security of ICT infrastructure were derived by implementing the models discussed in the Related Work section. Assuming that all vulnerabilities of a critical (X C ), high (X H ), and medium (X M ) severity must be fixed by administrators, the number of work hours required to improve security with the suggested models can be expressed as the sum of the constituent time spans required to fix each type of vulnerability complemented by the time needed for information processing and other operations, e.g., scan duration (T S ) [43,47]. Therefore, the equation used for the calculation of the time needed to eliminate all vulnerabilities with high and medium criticality with the first model (Figure 1) is expressed as follows:…”
Section: Methodsmentioning
confidence: 99%
“…Using the work hour ranges mentioned above, the vulnerability repair time (T FIX ) was divided into three subcategories in consideration of the number of hours required for repair: T FIX MAX represents the maximum number of work hours required to fix one vulnerability and was assumed to be equal to 9 h; T FIX AVERAGE is the average number of work hours required to fix one vulnerability and was assumed equal to 4.5 h; T FIX MI N is the minimum number of work hours and is assumed equal to 1 h. Then, the equations that were used to estimate the number of work hours required to improve the security of ICT infrastructure were derived by implementing the models discussed in the Related Work section. Assuming that all vulnerabilities of a critical (X C ), high (X H ), and medium (X M ) severity must be fixed by administrators, the number of work hours required to improve security with the suggested models can be expressed as the sum of the constituent time spans required to fix each type of vulnerability complemented by the time needed for information processing and other operations, e.g., scan duration (T S ) [43,47]. Therefore, the equation used for the calculation of the time needed to eliminate all vulnerabilities with high and medium criticality with the first model (Figure 1) is expressed as follows:…”
Section: Methodsmentioning
confidence: 99%
“…OWASP publishes the Top 10 Web Application Security Risks report guiding mitigating vulnerabilities [21]. NIST's National Vulnerability Database (NVD) maintains a comprehensive repository of vulnerabilities, including the Common Vulnerabilities and Exposures (CVE) catalog and the associated Common Weakness Enumeration (CWE) [22,23].…”
Section: Introductionmentioning
confidence: 99%
“…However, since the introduction of CVSS there have been numerous complaints and suggestions for improvement of its calculation [3], [4], [10]- [13]. The CVSS v.2 was recently updated, and several changes were introduced, however, several researchers have shown that this scoring system does not represent the real level of associated risks as well.…”
Section: Introductionmentioning
confidence: 99%
“…Common Vulnerability Scoring System (CVSS) is used to calculate the severity of vulnerabilities [3] and risks related to IT assets [4]. Industries rely on CVSS as a standard way to capture the principal characteristics of vulnerabilities and produce a numerical score reflecting their severity.…”
Section: Introductionmentioning
confidence: 99%