The Design of Information System Vulnerability Management Software Based on CVSS

Article Preview

Abstract:

The purpose of information system vulnerability analysis is to find loophole and to prevent endangering the information system security. Based on principles of information security risk assessment and Common Vulnerability Scoring System (CVSS), this paper presents a system model for information system vulnerability management. The function models are analyzed respectively; the technology features are also summarized in this paper.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

499-503

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Ritchey R. W, AmmannP. Using model checking to analyze network vulnerabilities. In: Proceedings of 2000 IEEE Symposium on Security and Privacy, Oakland, CA, 2000, 156-161.

DOI: 10.1109/secpri.2000.848453

Google Scholar

[2] Templeton S.J. Levitt K. A requiresprovides model for computer attacks . In: Proceedings of the New Security Paradigms Workshop 2000, Cork Ireland, 2000, 31-40.

Google Scholar

[3] http: /www. cioage. com/art/200706/46725. htm Predict threat of the information system security vulnerability analysis technique.

Google Scholar

[4] Duan Yunsuo, Liu Xin, Chen Zhong, Analysis on Combined Security Efficiency and Vulnerability for Information System Security Evaluation, Acta Scientiarum Naturalium Universitatis Pekinensis, No. 3 May 2005, 485-487.

Google Scholar

[5] HU Hua-ping LIU Bo ZHONG Qiu-xi PANG Li-hui Study and Implementation of Network Security Vulnerabilities Analysis and Disposition System(NS VADS). Journal of National University of Defense Techology, CA, 2004, 26-29.

Google Scholar

[6] DUAN Yunsuo LIU Xin CHEN Zhong Alalysis on Combined Securty Efficiency and Vulnerability for Information System Security Evaluation. Acta Scientianum Naturelium Universitatis Pekinensis, CA, 2005, 485-490.

Google Scholar

[7] XING Xu Jia, LIN Chuang, JIANG Yi Xin. A Survey of Computer Vulnerabilities Assessment. Journal of Computer, CA, 2004(1), 27-30.

Google Scholar

[8] XIN G Xin-Jia LIN Chuang J LANG Yi-Xin A Survey of Computer Vulnerabilities Assessment. Journal of Computer, CA, 2004, 27-30.

Google Scholar

[9] Ramakrishnan C.R., Sekar R. Model-base analysis of configuration vulnerabilities. Journal of Computer Security and Privacy, Oakland, CA, 2002, 254-265.

Google Scholar