Skip to Main content Skip to Navigation
Conference papers

On Computing Enterprise IT Risk Metrics

Abstract : Assessing the vulnerability of large heterogeneous systems is crucial to IT operational decisions such as prioritizing the deployment of security patches and enhanced monitoring. These assessments are based on various criteria, including (i) the NIST National Vulnerability Database which reports tens of thousands of vulnerabilities on individual components, with several thousand added every year, and (ii) the specifics of the enterprise IT infrastructure which includes many components.Defining and computing appropriate vulnerability metrics to support decision making remains a challenge. Currently, several IT organizations make use of the CVSS metrics that score vulnerabilities on individual components. CVSS does allow for environmental metrics, which are meant to capture the connectivity among the components; unfortunately, within Section 2.3 of [1] there are no guidelines for how these should be defined and, consequently, environmental metrics are rarely defined and used.We present a systematic approach to quantify and automatically compute the risk profile of an enterprise from information about individual vulnerabilities contained in CVSS scores. The metric we propose can be used as the CVSS environmental score. Our metric can be applied to the problem of prioritizing patches, customized to the connectivity of an enterprise. It can also be used to prioritize vulnerable components for purposes of enhanced monitoring.
Document type :
Conference papers
Complete list of metadata

Cited literature [9 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Monday, July 24, 2017 - 10:40:21 AM
Last modification on : Thursday, December 28, 2017 - 1:58:02 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Sandeep Bhatt, William Horne, Prasad Rao. On Computing Enterprise IT Risk Metrics. 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.271-280, ⟨10.1007/978-3-642-21424-0_22⟩. ⟨hal-01567601⟩



Record views


Files downloads