Models and Methods for Prioritizing Software Vulnerabilities Based on Business-Criticality Indicators and Probability of Exploitation
Abstract
This article examines existing models and methods for vulnerability prioritization, including CVSS v3.1/v4.0, the EPSS v4 exploit prediction system, the SSVC v2 framework, as well as their integration with asset business-criticality indicators and information on real-world exploitation based on CISA’s Known Exploited Vulnerabilities Catalog (KEV). The study methodology is grounded in a systematic review of the academic literature, a content analysis of technical documentation, and a comparative assessment of methods on a representative CVE dataset. Based on the findings, a composite prioritization model proposed by the author is introduced; it combines four signals – severity, probability, KEV status, and business criticality – into a single index with configurable weighting coefficients. It is shown that the application of the Composite Vulnerability Priority Score (CVPS) reduces the volume of vulnerabilities requiring immediate response by approximately sevenfold while preserving a high level of coverage of genuinely exploited threats. The results are of practical value for vulnerability-management specialists, chief information security officers, and those responsible for patch-management policy design.
Keywords
References
Similar Articles
- Dr. Rohan Verma, Dr. Sneha Kulkarni, Machine-Learning Architectures enabling Human Trait Verification Alternatives within Risk-Coverage Ecosystems: Resilient Identity Validation, Policy Adherence , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 02 (2026): Volume 03 Issue 02
- Jianhong Wei, Aaliyah M. Farouk, MITIGATING CONFIRMATION BIAS IN DEEP LEARNING WITH NOISY LABELS THROUGH COLLABORATIVE NETWORK TRAINING , International Journal of Modern Computer Science and IT Innovations: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Adrian K. Varela, Edge Intelligence-Driven Intrusion Detection for Internet of Things Networks in Next-Generation Communication Systems , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 03 (2026): Volume03 Issue03
- Dr. Eleanor Whitfield, Architecting Secure and Cost-Optimized Iot-Cloud Ecosystems: Integrating AI-Driven Intrusion Detection, Multi-Path Routing, And Intelligent Workload Scheduling in Distributed Systems , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Daniela Costa, Rafael Lima, Dynamic Deep Neural Network Partitioning For Low-Latency Edge-Assisted Video Analytics: A Learning-To-Partition Approach , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Svetlana Petrova, Beyond Hyperscale: The Socio-Technical Adaptation of Site Reliability Engineering for Enhanced Resilience in Critical Infrastructure , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Dr. Rahul Mehta, Enhancing Credit Initiation Processes through Customer Relationship Platforms for Agricultural Enterprise Efficiency , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Dr. Emiliano R. Vassalli, Event-Driven Architectures in Fintech Systems: A Comprehensive Theoretical, Methodological, and Resilience-Oriented Analysis of Kafka-Centric Microservices , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Sneha R. Patil, Dr. Liam O. Hughes, ENHANCED MALWARE DETECTION THROUGH FUNCTION PARAMETER ENCODING AND API DEPENDENCY MODELING , International Journal of Modern Computer Science and IT Innovations: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Ahmed R. Mostafa, Prof. Mahmoud A. Taha, AFFORDABLE VISION-BASED SYSTEMS FOR REAL-TIME CHESSBOARD DIGITIZATION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 01 (2025): Volume 02 Issue 01
You may also start an advanced similarity search for this article.