Models and Methods for Prioritizing Software Vulnerabilities Based on Business-Criticality Indicators and Probability of Exploitation
Abstract
This article examines existing models and methods for vulnerability prioritization, including CVSS v3.1/v4.0, the EPSS v4 exploit prediction system, the SSVC v2 framework, as well as their integration with asset business-criticality indicators and information on real-world exploitation based on CISA’s Known Exploited Vulnerabilities Catalog (KEV). The study methodology is grounded in a systematic review of the academic literature, a content analysis of technical documentation, and a comparative assessment of methods on a representative CVE dataset. Based on the findings, a composite prioritization model proposed by the author is introduced; it combines four signals – severity, probability, KEV status, and business criticality – into a single index with configurable weighting coefficients. It is shown that the application of the Composite Vulnerability Priority Score (CVPS) reduces the volume of vulnerabilities requiring immediate response by approximately sevenfold while preserving a high level of coverage of genuinely exploited threats. The results are of practical value for vulnerability-management specialists, chief information security officers, and those responsible for patch-management policy design.
Keywords
References
Similar Articles
- Priya Kapoor, A Comprehensive Analytical Framework for Zero Trust Architecture: Evolutionary Paradigms, Socio-Technical Adoption, and Integrative Security in Heterogeneous Network Environments , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 09 (2025): Volume 02 Issue 09
- Alexander J. Morrison, Hyperautomation as an Institutional Catalyst: Integrating Generative Artificial Intelligence and Process Mining for the Transformation of Financial Workflows , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Victor P. Ionescu, EXPLAINABLE ARTIFICIAL INTELLIGENCE AS A FOUNDATION FOR SUSTAINABLE, TRUSTWORTHY, AND HUMAN-CENTRIC DECISION-MAKING ACROSS CONSUMER, SUPPLY CHAIN, AND HEALTHCARE DOMAINS , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 02 (2026): Volume 03 Issue 02
- Dr. Rania E. El-Gamal, EMPIRICAL CHARACTERIZATION OF IOT FIRMWARE VERSION DIVERSITY AND PATCHING STATUS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 03 (2025): Volume 02 Issue 03
- James T. Holloway, Modularity, Resilience, and Functional Redundancy: Integrating Microservices Architecture Principles with Tropical Montane Cloud Forest Dynamics , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Tang Shu Qi, Autonomous Resilience: Integrating Generative AI-Driven Threat Detection with Adaptive Query Optimization in Distributed Ecosystems , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Dr. Elena R. Moretti, Intent-Aware Decentralized Identity and Zero-Trust Framework for Agentic AI Workloads , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Dr. Elias R. Vance, Prof. Seraphina J. Choi, A Machine Learning Framework for Predicting Cardiovascular Disease Risk: A Comparative Analysis Using the UCI Heart Disease Dataset , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Dr. Sofia Duarte, Jiwon Park, SECURING LARGE-SCALE IOT NETWORKS: A FEDERATED TRANSFER LEARNING APPROACH FOR REAL-TIME INTRUSION DETECTION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 06 (2025): Volume 02 Issue 06
- Dr. Andika Prasetyo, Siti Rahmawati, M.Sc., Rizky Maulana, Structured Teaching Framework Focused on Beginner-Level Software Development Skills , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 04 (2026): Volume 03 Issue 04
You may also start an advanced similarity search for this article.