Abstract

The purpose of this scientific research is to analyze the possibilities of increasing the level of protection of an organization's defense against cyber threats by applying vulnerability prioritization algorithms. There are various approaches to creating vulnerability prioritization algorithms that take into account many metrics. For example, the potential impact on the information system when exploiting the vulnerability, the complexity of exploiting the vulnerability, the difficulty of eliminating it, etc. This article is devoted to the issues of organizing the process of managing vulnerabilities, in particular, various methods (algorithms) of their prioritization to determine the priority of elimination and the rational distribution of human resources of the organization. Various algorithms for prioritizing vulnerabilities were reviewed and analyzed, and conclusions were drawn about their advantages and disadvantages. In conclusion, the work proposes a version of the vulnerability prioritization algorithm that takes into account the most important metrics, as well as the recommendations of the FSTEC of Russia.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call