Models and Methods for Prioritizing Software Vulnerabilities Based on Business-Criticality Indicators and Probability of Exploitation
Abstract
This article examines existing models and methods for vulnerability prioritization, including CVSS v3.1/v4.0, the EPSS v4 exploit prediction system, the SSVC v2 framework, as well as their integration with asset business-criticality indicators and information on real-world exploitation based on CISA’s Known Exploited Vulnerabilities Catalog (KEV). The study methodology is grounded in a systematic review of the academic literature, a content analysis of technical documentation, and a comparative assessment of methods on a representative CVE dataset. Based on the findings, a composite prioritization model proposed by the author is introduced; it combines four signals – severity, probability, KEV status, and business criticality – into a single index with configurable weighting coefficients. It is shown that the application of the Composite Vulnerability Priority Score (CVPS) reduces the volume of vulnerabilities requiring immediate response by approximately sevenfold while preserving a high level of coverage of genuinely exploited threats. The results are of practical value for vulnerability-management specialists, chief information security officers, and those responsible for patch-management policy design.
Keywords
References
Similar Articles
- Dr. Mingyu L. Chen, Muhammad Siddiqui, CODE-SWITCHED RELATION EXTRACTION: A NOVEL DATASET AND TRAINING METHODOLOGY , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 02 (2025): Volume 02 Issue 02
- Dr. Markus Vogel, Large Language Model–Driven Digital Twins for Lean-Aware Manufacturing Execution System Optimization in Industry 4.0 Environments , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Oliver P. Harrington, Reconceptualizing Enterprise Application Frameworks: ASP.NET Core and the Structural Foundations of Cross-Platform Development , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 12 (2025): Volume 02 Issue 12
- Prof. Lucas F. Oliveira, SM9-ENHANCED KEY-POLICY ATTRIBUTE-BASED ENCRYPTION: DESIGN, ANALYSIS, AND APPLICATIONS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 06 (2025): Volume 02 Issue 06
- Anastasiia Livintseva, Re-coding Community: Designing AI-Native Platforms for Trust, Belonging, and Collective Agency , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 12 (2025): Volume 02 Issue 12
- Dr. Joshua Muller, Zero-Trust Transformation in Healthcare IT: Securing Legacy Medical Devices Through Windows 11 Modernization in Clinical Workstations , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Hiroshi Tanaka, Architectural Synergies: Integrating Blockchain, Fog Computing, And Generative Intelligence for Secure Digital Twin Ecosystems in Cyber-Physical Systems , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 02 (2026): Volume 03 Issue 02
- Mykola Nesvietaiev, Multisided Digital Platforms in the Sphere of Family Well-Being: Models for Balancing the Interests of Children, Parents, and Service Providers Under Regulatory Requirements for the Protection of Minors , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 03 (2025): Volume 02 Issue 03
- Alistair J. Finch, Sustainable Development and Mechanical Performance of Natural Fiber–Reinforced Polymer Composites: Comprehensive Analysis, Methodologies, and Future Directions , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 05 (2025): Volume 02 Issue 05
- Serhii Svynarov, AI-Driven Automation in Cloud-Based Business Systems: A Practical Implementation Using Microservices Architecture , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 05 (2026): Volume 03 Issue 05
You may also start an advanced similarity search for this article.