Digitala Vetenskapliga Arkivet

Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Vulnerability Management: Towards better vulnerability prioritisation, an automated proof of concept
Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
2024 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Managing information technology security risk is challenging and relies heavily on the vulnerability assessment process within an organisation's vulnerability management strategy. The common vulnerability scoring system is the de facto for prioritising vulnerabilities during the vulnerability assessment process, but its reliance on an external threat context renders it unjustifiable for determining practical risk for vulnerabilities in a specific information system. Alternative methods, such as Tenable’s vulnerability priority rating and the exploitability prediction scoring system, also fall short by only predicting vulnerability exploitability based on external data. This highlights an existing challenge attributed to the lack of a comprehensive method to determine the practical risk of a vulnerability during the vulnerability assessment process. This study proposes automated vulnerability exploitability tests (exploit-t) as a vulnerability risk assessment method to improve risk-based prioritisation based on internal exploitability threat intelligence. The study employs a design science research framework and experiments in a virtual network environment, which is a simulation that validates the proposed method. The proposed method produces a score code-named bukirwa_score, which is a risk score that indicates the practical risk of a vulnerability based on the severity of the vulnerability and the existing security controls and measures. Results show that the proposed vulnerability risk assessment method has the capability to reduce the number of high-priority vulnerabilities by providing a better assessment of their risk. The technique demonstrates improvements in vulnerability prioritisation and provides a more practical risk score and rating that are both explainable and justifiable.

Place, publisher, year, edition, pages
2024.
Keywords [en]
vulnerability, prioritisation, risk, exploitability, severity, criticality, penetration testing, assessment, automation, management, score, threat, rating, practical
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:su:diva-242844OAI: oai:DiVA.org:su-242844DiVA, id: diva2:1955777
Available from: 2025-04-30 Created: 2025-04-30

Open Access in DiVA

fulltext(2353 kB)18 downloads
File information
File name FULLTEXT01.pdfFile size 2353 kBChecksum SHA-512
bcb2e7414e4e3f06fab36ec837960bd7cffbdedf757d24f086d6e39836800c4f0cd086ce894ee25e7cdef75a4fe5722c8739e2517ef3b9a836a19169b7182d6c
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Kabenge, Joseph
By organisation
Department of Computer and Systems Sciences
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 18 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 191 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf