Domestic and international competitiveness of Korea’s information security industry

2021 ◽  
Vol 24 (6) ◽  
pp. 1163-1185
Author(s):  
Pang-ryong Kim ◽  
Youngsang Yoo
2008 ◽  
Vol 108 (3) ◽  
pp. 368-384 ◽  
Author(s):  
Sang‐Hyun Park ◽  
Sang M. Lee ◽  
Seong No Yoon ◽  
Seung‐Jun Yeon

Author(s):  
Jay Jacobs ◽  
sasha romanosky ◽  
Ben Edwards ◽  
Michael Roytman ◽  
Idris Adjerid

Despite the large investments in information security technologies and research over the past decades, the information security industry is still immature when it comes to vulnerability management. In particular, the prioritization of remediation efforts within vulnerability management programs predominantly relies on a mixture of subjective expert opinion, and severity scores. Compounding the need for prioritization is the increase in the number of vulnerabilities the average enterprise has to remediate. This paper describes the first open, data-driven framework for assessing vulnerability threat, that is, the probability that a vulnerability will be exploited in the wild within the first twelve months after public disclosure. This scoring system has been designed to be simple enough to be implemented by practitioners without specialized tools or software, yet provides accurate estimates(ROC AUC=0.838of exploitation. Moreover, the implementation is flexible enough that it can be updated as more, and better, data becomes available. We call this system the Exploit Prediction Scoring System, EPSS.


2013 ◽  
Vol 6 (3) ◽  
pp. 146-152
Author(s):  
Cong Gao ◽  
◽  
Jianfeng Ma ◽  
Jingjing Guo ◽  
Liang Zhang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document