Models and Methods for Prioritizing Software Vulnerabilities Based on Business-Criticality Indicators and Probability of Exploitation
Abstract
This article examines existing models and methods for vulnerability prioritization, including CVSS v3.1/v4.0, the EPSS v4 exploit prediction system, the SSVC v2 framework, as well as their integration with asset business-criticality indicators and information on real-world exploitation based on CISA’s Known Exploited Vulnerabilities Catalog (KEV). The study methodology is grounded in a systematic review of the academic literature, a content analysis of technical documentation, and a comparative assessment of methods on a representative CVE dataset. Based on the findings, a composite prioritization model proposed by the author is introduced; it combines four signals – severity, probability, KEV status, and business criticality – into a single index with configurable weighting coefficients. It is shown that the application of the Composite Vulnerability Priority Score (CVPS) reduces the volume of vulnerabilities requiring immediate response by approximately sevenfold while preserving a high level of coverage of genuinely exploited threats. The results are of practical value for vulnerability-management specialists, chief information security officers, and those responsible for patch-management policy design.
Keywords
References
Similar Articles
- Alistair J. Finch, Integrating Jira, Jenkins, and Azure DevOps to Optimize Software Release Pipelines , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Ngozi Okafor, A Consumer-Driven Contract-Based Approach to Verifying User Interface Integration in Microservices Architectures , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Dr. Mateo Alvarez, SaaS-Driven Digital Transformation and Customer Retention in Hospitality Ecosystems: A Multitheoretical and Socio-Technical Reinterpretation of Service Value Creation , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 12 (2025): Volume 02 Issue 12
- Dr. Rakesh T. Sharma, Dr. Neha R. Kulkarni, GUIDING SEARCH-BASED SOFTWARE TESTING WITH DEFECT PREDICTION: AN EMPIRICAL INVESTIGATION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 03 (2025): Volume 02 Issue 03
- Dr. Alistair Sterling, Architectural Evolution and Decomposition Strategies: A Comprehensive Analysis of Microservice Migration, Performance Optimization, And Machine Learning-Assisted Service Boundary Detection , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 12 (2025): Volume 02 Issue 12
- Dr. Alexei Morozov, Prof. Kevin J. Donovan, The Transformative Impact of Containerization on Modern Web Development: An In-depth Analysis of Docker and Kubernetes Ecosystems , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Anh N. Tran, Siew H. Lim, A Critical Analysis of Apache Kafka's Role in Advancing Microservices Architecture: Performance, Patterns, and Persistence , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Dr. Abdulrahman O. Nassar, Dr. Cheng-Hao Lin, CHARACTERIZING CORE-PERIPHERY STRUCTURES IN NETWORKS VIA PRINCIPAL COMPONENT ANALYSIS OF NEIGHBORHOOD-BASED BRIDGE NODE CENTRALITY , International Journal of Modern Computer Science and IT Innovations: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Prof. Isabella Rossi, Dr. Luis Fernando Páez, GEOSPATIAL ANOMALY DETECTION FOR ENHANCED SECURITY IN DELAY-TOLERANT NETWORKS , International Journal of Modern Computer Science and IT Innovations: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Elena Marovic, Hyperautomation-Driven Financial Workflow Transformation: Integrating Generative Artificial Intelligence, Process Mining, and Enterprise Digital Architectures , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 01 (2026): Volume 03 Issue 01
You may also start an advanced similarity search for this article.