Models and Methods for Prioritizing Software Vulnerabilities Based on Business-Criticality Indicators and Probability of Exploitation
Abstract
This article examines existing models and methods for vulnerability prioritization, including CVSS v3.1/v4.0, the EPSS v4 exploit prediction system, the SSVC v2 framework, as well as their integration with asset business-criticality indicators and information on real-world exploitation based on CISA’s Known Exploited Vulnerabilities Catalog (KEV). The study methodology is grounded in a systematic review of the academic literature, a content analysis of technical documentation, and a comparative assessment of methods on a representative CVE dataset. Based on the findings, a composite prioritization model proposed by the author is introduced; it combines four signals – severity, probability, KEV status, and business criticality – into a single index with configurable weighting coefficients. It is shown that the application of the Composite Vulnerability Priority Score (CVPS) reduces the volume of vulnerabilities requiring immediate response by approximately sevenfold while preserving a high level of coverage of genuinely exploited threats. The results are of practical value for vulnerability-management specialists, chief information security officers, and those responsible for patch-management policy design.
Keywords
References
Similar Articles
- Dr. Erik G. Johansson, Dr. Linnea K. Blomqvist, LEVERAGING PERSISTENCE AND GRAPH NEURAL NETWORKS FOR ENHANCED INFORMATION POPULARITY FORECASTING , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 04 (2025): Volume 02 Issue 04
- Dr. Isabella D. Ricci, Dr. Farah A. Rahman, OPTIMIZING WEB DEVELOPMENT THROUGH STRATEGIC WEB FRAMEWORK ADOPTION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 05 (2025): Volume 02 Issue 05
- Martin Schneider, Diego Martínez, A Comparative Benchmark Analysis of Transactional and Analytical Performance in PostgreSQL and MySQL , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Paul Kovalenko, Resilient Embedded and Automotive Systems: Integrating Lockstep Architectures, Software-Based Fault Detection, And Cyber-Physical Safety Models for Next-Generation Reliability , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 12 (2025): Volume 02 Issue 12
- John A. Prescott, A Unified Framework for Time-Sensitive and Resilient In-Vehicle Communication: Integrating Automotive Ethernet, Wireless TSN, and IoTEnabled Vehicle Health Monitoring , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 08 (2025): Volume 02 Issue 08
- Prof. Dr. Matthias Reinhardt, Cloud-Orchestrated Ensemble Deep Learning Architectures for Predictive Modeling of Cryptocurrency Market Dynamics: A Theoretical, Empirical, and Cyber-Physical Systems Perspective , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- John Doe, Transforming Supply Chain Management Through Artificial Intelligence: A Holistic Theoretical Analysis , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 09 (2025): Volume 02 Issue 09
- Puspita Sari, Nathanael Sianipar, A DESIGN SCIENCE APPROACH TO MITIGATING INTER-SERVICE INTEGRATION FAILURES IN MICROSERVICE ARCHITECTURES: THE CONSUMER-DRIVEN CONTRACT TESTING FRAMEWORK AND PILOT IMPLEMENTATION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Dr. Alejandro Martínez, Explainable Artificial Intelligence As A Foundation For Trust, Sustainability, And Responsible Decision-Making Across Business And Healthcare Ecosystems , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Dr. Arjun S. Patel, Prof. Elena D. Petrovna, CONVERGENT DATABASE ARCHITECTURES: MULTI-MODEL DESIGN AND QUERY OPTIMIZATION IN NEWSQL SYSTEMS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 02 (2025): Volume 02 Issue 02
You may also start an advanced similarity search for this article.