Start Date
16-8-2018 12:00 AM
Description
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and threats. The U.S. Computer Emergency Response Team Coordination Center (CERT/CC) is the official body to disclose vulnerability information. Increasingly, hackers also use social media to share vulnerability and exploit information. In this study, we present a conceptual ontology of cybersecurity vulnerability management that integrates information from official sources with social media intelligence. The ontology models products, threats, vulnerabilities, countermeasures, intelligence and their relations. The ontology extends the vulnerability concepts provided by National Institute of Standards and Technology (NIST) and can be used as a general vocabulary of the domain of cybersecurity vulnerability management. Further, the ontology could be useful for reasoning about the relationships between entities to issue cybersecurity alerts for security analysts to analyze and manage vulnerabilities.
Recommended Citation
Syed, Romilla and Zhong, Haonan, "Cybersecurity Vulnerability Management: An Ontology-Based Conceptual Model" (2018). AMCIS 2018 Proceedings. 6.
https://aisel.aisnet.org/amcis2018/Semantics/Presentations/6
Cybersecurity Vulnerability Management: An Ontology-Based Conceptual Model
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and threats. The U.S. Computer Emergency Response Team Coordination Center (CERT/CC) is the official body to disclose vulnerability information. Increasingly, hackers also use social media to share vulnerability and exploit information. In this study, we present a conceptual ontology of cybersecurity vulnerability management that integrates information from official sources with social media intelligence. The ontology models products, threats, vulnerabilities, countermeasures, intelligence and their relations. The ontology extends the vulnerability concepts provided by National Institute of Standards and Technology (NIST) and can be used as a general vocabulary of the domain of cybersecurity vulnerability management. Further, the ontology could be useful for reasoning about the relationships between entities to issue cybersecurity alerts for security analysts to analyze and manage vulnerabilities.