首页> 外文期刊>Decision Line >Managing Enterprise Risks of Technological Systems: An Exploratory Empirical Analysis of Vulnerability Characteristics as Drivers of Exploit Publication
【24h】

Managing Enterprise Risks of Technological Systems: An Exploratory Empirical Analysis of Vulnerability Characteristics as Drivers of Exploit Publication

机译:管理技术系统的企业风险:漏洞发布驱动程序漏洞特征的探索实证分析

获取原文
获取原文并翻译 | 示例
           

摘要

Enterprises experience opportunistic exploits targeted at vulnerable technology. Vulnerabilities in software-based applications, service systems, enterprise platforms, and supply chains are discovered and disclosed on an alarmingly regular basis. A necessary enterprise risk management task concerns identifying and patching vulnerabilities. Yet it is a costly affair to develop and deploy patches to alleviate risk and prevent damage from exploit attacks. Given the limited resources available, technology producers and users must identify priorities for such tasks. When not overlooked, vulnerability-patching tasks often are prioritized based on vulnerability disclosure dates, thus vulnerabilities disclosed earlier usually have patches developed and deployed earlier. We suggest priorities also should focus on time-dependent likelihoods of exploits getting published. We analyze data on software exploits to identify factors associated with the duration between a vulnerability discovery date and the date when an exploit is publicly available, a time window for patching before exploit attack levels may escalate. Actively prioritizing vulnerability patching based on likelihoods of exploit publication may help lessen losses due to exploit attacks. Technology managers might apply the insights to better estimate relative risk levels, and better prioritize protection efforts toward vulnerabilities having higher risk of earlier exploitation. [Submitted: March 12, 2013. Revised: November 19, 2015. Accepted: November 21, 2015.]
机译:企业体验机会主义利用,针对易受攻击的技术。基于软件的应用程序,服务系统,企业平台和供应链的漏洞被发现并以惊人的定期披露。必要的企业风险管理任务涉及识别和修补漏洞。然而,开发和部署补丁以减轻风险并防止漏洞攻击造成损害是一种成本昂贵的事情。鉴于可用资源有限,技术生产商和用户必须确定此类任务的优先事项。当未被忽视时,漏洞修补任务通常基于漏洞泄露日期优先考虑,因此前面披露的漏洞通常具有早期开发和部署的补丁。我们建议优先事项也应关注剥削的时间依赖性可能性出版。我们分析软件漏洞数据的数据,以识别与漏洞发现日期和漏洞利用的日期之间的持续时间相关的因素,在利用攻击级别之前修补的时间窗口可能会升级。基于利用出版物的可能性,主动优先考虑漏洞修补可能有助于降低由于利用攻击而减少损失。科技经理可能会应用更好地估计相对风险水平的见解,并更好地优先考虑对漏洞风险更高的脆弱性的保护努力。 [提交:2013年3月12日。修订:2015年11月19日。接受:2015年11月21日。

著录项

  • 来源
    《Decision Line》 |2016年第6期|1073-1102|共30页
  • 作者

    Sen Ravi; Heim Gregory R.;

  • 作者单位

    Texas A&M Univ Mays Business Sch Dept Informat & Operat Management 320S Wehner Bldg College Stn TX 77843 USA;

    Texas A&M Univ Mays Business Sch Dept Informat & Operat Management 320U Wehner Bldg College Stn TX 77843 USA;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号