Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/123456789/32456
Title: Development of an Information Security Risk Assessment Model Through the Calculation of the Vulnerability Danger Factor
Authors: Mezentseva, O. S.
Мезенцева, О. С.
Keywords: CVSS;Risk assessment;Information security;National programme
Issue Date: 2026
Publisher: Springer Science and Business Media Deutschland GmbH
Citation: Utenkova, M., Komkov, A., Maksimova, E., Mezentseva, O. Development of an Information Security Risk Assessment Model Through the Calculation of the Vulnerability Danger Factor // Lecture Notes in Networks and Systems. - 2026. - 1456 LNNS. - pp. 434 - 441. - DOI: 10.1007/978-3-032-07275-7_39
Series/Report no.: Lecture Notes in Networks and Systems
Abstract: The relevance and necessity of research in the field of information security risk assessment are justified against the backdrop of the trend towards digitalization and as part of the national projects “Digital Economy” and its successor “Data Economy and Digital Transformation of the State”. The existing standards for information security risk management have been analyzed. A description has been given of the classic statistical risk assessment model and a dynamic model that takes into account a parameter responsible for the intensity of destructive effects accumulation. The disadvantages of the classic risk assessment model have been identified, which relate to problems with expert assessments that affect the quality of the assessment: the lack of accumulated statistics over the years or lack of qualified experts. An analysis has been conducted of the open standard for vulnerability danger quantification, CVSS. A risk assessment model has been developed based on an evaluation of the risk associated with CVSS vulnerabilities. The possibility of defining risk as a combination of two linguistic variables has also been considered. The model is described using linguistic fuzzy logic, and the levels of danger for each parameter in the revised model are determined. Additionally, the option of modifying the model to include the cost of addressing the vulnerability has been explored. Prospects for further development of this approach are discussed.
URI: https://dspace.ncfu.ru/handle/123456789/32456
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File SizeFormat 
scopusresults 3838.pdf
  Restricted Access
128.29 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.