Scoring Cyber Vulnerabilities based on Their Impact on Organizational Goals*

O. Keskin, Nick Gannon, B. Lopez, Unal Tatar
{"title":"Scoring Cyber Vulnerabilities based on Their Impact on Organizational Goals*","authors":"O. Keskin, Nick Gannon, B. Lopez, Unal Tatar","doi":"10.1109/SIEDS52267.2021.9483741","DOIUrl":null,"url":null,"abstract":"Vulnerability Management, which is a vital part of risk and resiliency management efforts, is a continuous process of identifying, classifying, prioritizing, and removing vulnerabilities on devices that are likely to be used by attackers to compromise a network component. For effective and efficient vulnerability management, which requires extensive resources– such as time and personnel, vulnerabilities should be prioritized based on their criticality. One of the most common methods to prioritize vulnerabilities is the Common Vulnerability Scoring System (CVSS). However, in its severity score, the National Institute of Standards and Technology (NIST) only provides the base metric values that include exploitability and impact information for the known vulnerabilities and acknowledges the importance of temporal and environmental characteristics to have a more accurate vulnerability assessment. There is no established method to conduct the integration of these metrics. In this study, we created a testbed to assess the vulnerabilities by considering the functional dependencies between vulnerable assets, other assets, and business processes. The experiment results revealed that a vulnerability’s severity significantly changes from its CVSS base score when the vulnerable asset’s characteristics and role inside the organization are considered.","PeriodicalId":426747,"journal":{"name":"2021 Systems and Information Engineering Design Symposium (SIEDS)","volume":"72 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Systems and Information Engineering Design Symposium (SIEDS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIEDS52267.2021.9483741","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Vulnerability Management, which is a vital part of risk and resiliency management efforts, is a continuous process of identifying, classifying, prioritizing, and removing vulnerabilities on devices that are likely to be used by attackers to compromise a network component. For effective and efficient vulnerability management, which requires extensive resources– such as time and personnel, vulnerabilities should be prioritized based on their criticality. One of the most common methods to prioritize vulnerabilities is the Common Vulnerability Scoring System (CVSS). However, in its severity score, the National Institute of Standards and Technology (NIST) only provides the base metric values that include exploitability and impact information for the known vulnerabilities and acknowledges the importance of temporal and environmental characteristics to have a more accurate vulnerability assessment. There is no established method to conduct the integration of these metrics. In this study, we created a testbed to assess the vulnerabilities by considering the functional dependencies between vulnerable assets, other assets, and business processes. The experiment results revealed that a vulnerability’s severity significantly changes from its CVSS base score when the vulnerable asset’s characteristics and role inside the organization are considered.
基于对组织目标影响的网络漏洞评分*
漏洞管理是风险和弹性管理工作的重要组成部分,它是一个持续的过程,用于识别、分类、优先排序和删除可能被攻击者用来破坏网络组件的设备上的漏洞。对于需要大量资源(如时间和人员)的有效和高效的漏洞管理,应该根据漏洞的严重性对其进行优先级排序。确定漏洞优先级的最常用方法之一是通用漏洞评分系统(CVSS)。然而,在其严重性评分中,美国国家标准与技术研究所(NIST)只提供了基本度量值,其中包括已知漏洞的可利用性和影响信息,并承认时间和环境特征对于更准确的漏洞评估的重要性。没有既定的方法来进行这些度量的集成。在本研究中,我们创建了一个测试平台,通过考虑脆弱资产、其他资产和业务流程之间的功能依赖关系来评估漏洞。实验结果表明,当考虑到易受攻击资产的特征和在组织中的角色时,漏洞的严重程度与其CVSS基础分数有显著变化。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信