Article

Article title INFLUENCE OF MALICIOUS USER MODEL ON INFORMATIONAL SYSTEM VULNERABILITY SCORING PROCESS
Authors N.V. Rubtsov
Section SECTION II. MATHEMATICAL MODELS AND METHODS
Month, Year 05, 2011 @en
Index UDC 004.056
DOI
Abstract Vulnerability danger level scoring allows optimizing process of their elimination and to lower expenses. Existing methods of vulnerability estimation not always can be adapted for current practical situation. Analytic hierarchy process may be used as one of the alternative scoring methods for vulnerabilities, which have been found in informational system. This method demands building a criterion scoring system. It is proposed to address the malicious user model in order to simplify building process and reduce time costs.

Download PDF

Keywords Vulnerability; information security; vulnerability estimation; informational system; mali- cious user model; analytic hierarchy process.
References 1. Mell P., Scarfone K., Romanosky S. CVSS. A Complete Guide to the Common Vulnerability Scoring System. Version 2.0. [Электронный ресурс]/ P. Mell, K. Scarfone, S. Romanoskyю – Режим доступа: http://www.first.org/cvss/cvss-guide.html. Дата обращения: 11.12.2009.
2. Завгородний В.И. Комплексная защита информации в компьютерных системах: Учебное пособие. – М.: Логос; ПБОЮЛ Н. А. Егоров, 2001. – 264 с.
3. Саати Т. Г. Принятие решений. Метод анализа иерархий / Т.Г. Саати: Пер. с англ. Р.Г. Вачнадзе. – М.: Радио и связь, 1993. – 320 с.

Comments are closed.