Models and Methods for Prioritizing Software Vulnerabilities Based on Business-Criticality Indicators and Probability of Exploitation
Abstract
This article examines existing models and methods for vulnerability prioritization, including CVSS v3.1/v4.0, the EPSS v4 exploit prediction system, the SSVC v2 framework, as well as their integration with asset business-criticality indicators and information on real-world exploitation based on CISA’s Known Exploited Vulnerabilities Catalog (KEV). The study methodology is grounded in a systematic review of the academic literature, a content analysis of technical documentation, and a comparative assessment of methods on a representative CVE dataset. Based on the findings, a composite prioritization model proposed by the author is introduced; it combines four signals – severity, probability, KEV status, and business criticality – into a single index with configurable weighting coefficients. It is shown that the application of the Composite Vulnerability Priority Score (CVPS) reduces the volume of vulnerabilities requiring immediate response by approximately sevenfold while preserving a high level of coverage of genuinely exploited threats. The results are of practical value for vulnerability-management specialists, chief information security officers, and those responsible for patch-management policy design.
Keywords
References
Similar Articles
- Hakim Bin Abdullah, Marcus Tanaka, The Fusion of Enterprise Resource Planning and Artificial Intelligence: Leveraging SAP Systems for Predictive Supply Chain Resilience and Performance , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 07 (2025): Volume 02 Issue 07
- Dr. Jonathan Miller, Dr. Emily Carter, A Deep Learning-Based Biometric Authentication Architecture for Banking Fraud Prevention Using Google Teachable Machine and Facial Recognition Analytics , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 05 (2026): Volume 03 Issue 05
- Dr. Elena Marković, Hyperautomation as a Socio-Technical Paradigm: Integrating Robotic Process Automation, Artificial Intelligence, and Workforce Analytics for the Future Digital Enterprise , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Dr. Leila Mansouri, Cloud Computing AsInfrastructural ESG Capital: Strategic Implications For Corporate Sustainability , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Rahul van Dijk, Advancing Circular Business Models through Big Data and Technological Integration: Pathways for Sustainable Value Creation , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 12 (2025): Volume 02 Issue 12
- Dr. Rohan S. Whitaker, Predictive and Intelligent HVAC Systems: Integrative Frameworks for Performance, Maintenance, and Energy Optimization , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Victor E. Halden, Integrating AI-Driven Automation into Modern DevOps: Advancements, Challenges, and Strategic Implications in Software Engineering , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 02 (2026): Volume 03 Issue 02
- Dr. Lukas Weber, Dr. Anna Schmidt, An Optimized Convolutional Neural Network Architecture for Accurate Skin Lesion Analysis and Intelligent Skin Cancer Prediction System , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 05 (2026): Volume 03 Issue 05
- Prof. Elise Vandermark, INTEGRATING LAKEHOUSE ARCHITECTURES AND CLOUD DATA WAREHOUSING FOR NEXT-GENERATION ENTERPRISE ANALYTICS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 12 (2025): Volume 02 Issue 12
- Rina Kobayashi, Algorithmic Decision Engines and The Regulatory Frontier: A Multi-Dimensional Analysis of Machine Learning Architectures and Governance in Global Financial Ecosystems , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 02 (2026): Volume 03 Issue 02
You may also start an advanced similarity search for this article.