UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 6
June-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1906W99


Registration ID:
217680

Page Number

778-786

Share This Article


Jetir RMS

Title

Understanding the Vulnerability Scoring System through Comparative Analysis

Abstract

A successful cyber-attack can make a loss of confidentiality, availability and integrity of the organization. Almost all software are having vulnerabilities of one form or another. Increasing demand and use of software almost in every field invites attackers to crack the system and perform malicious activities. Some vulnerabilities causes system to crash and others may cause loss of connectivity. Vulnerabilities in software’s such as Buffer Overflow, Race condition and Invalidated Input are the major source from an intruder that can enter in the system. To overcome these issues IT companies and developers are using different vulnerability scoring systems. These scoring systems are used to produce numerical scores of vulnerabilities reflecting their severity. One of the most famous scoring systems used by developers is CVSS (Common Vulnerability Scoring System). It is an open industry standard for rating IT vulnerabilities and helping developers to prioritize vulnerabilities. The purpose to use these scoring systems is to find out the fundamental characteristics of vulnerabilities so that issue can be resolved on severity basis. Most of the vulnerabilities found after use by millions of users. Even some vulnerabilities are never reported and these vulnerabilities are called zero-day vulnerabilities. In this paper, we presented a discussion on the three vulnerability scoring systems i.e. (CVSS, VRSS and CWSS) which will help developers to understand the scoring system so as to prioritize vulnerabilities.

Key Words

Vulnerability, CVSS, VRSS, CWSS, Threats

Cite This Article

"Understanding the Vulnerability Scoring System through Comparative Analysis", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 6, page no.778-786, June 2019, Available :http://www.jetir.org/papers/JETIR1906W99.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Understanding the Vulnerability Scoring System through Comparative Analysis", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 6, page no. pp778-786, June 2019, Available at : http://www.jetir.org/papers/JETIR1906W99.pdf

Publication Details

Published Paper ID: JETIR1906W99
Registration ID: 217680
Published In: Volume 6 | Issue 6 | Year June-2019
DOI (Digital Object Identifier):
Page No: 778-786
Country: -, -, - .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002825

Print This Page

Current Call For Paper

Jetir RMS