Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

S3: Security Score System

Version 1 : Received: 6 December 2023 / Approved: 12 December 2023 / Online: 12 December 2023 (04:58:05 CET)

How to cite: Valadares, D.; Santos, D.; Perkusich, A. S3: Security Score System. Preprints 2023, 2023120776. https://doi.org/10.20944/preprints202312.0776.v1 Valadares, D.; Santos, D.; Perkusich, A. S3: Security Score System. Preprints 2023, 2023120776. https://doi.org/10.20944/preprints202312.0776.v1

Abstract

Security in the Internet of Things (IoT) is a critical concern due to the growing number of connected devices and the limited resources to implement robust security mechanisms in most of them. Adopting standard assessment frameworks, such as CVSS (Common Vulnerability Score System), allows for systematic vulnerability assessment. At the same time, CVE (Common Vulnerabilities and Exposures) records provide unique identifiers for known security issues, making it easier to share information. However, comparing security solutions is still challenging due to the diverse nature of IoT devices and the ever-evolving threat landscape, requiring continual innovation and collaboration between stakeholders. Furthermore, there still needs to be a simple way to compare technologies and solutions, taking into account the security provided by them. In this sense, in this article, we propose a tool for calculating a security score based on the CVSS index of each existing vulnerability in a given technology. We explain how the tool performs the calculation, discuss some challenges, and propose improvements for future work.

Keywords

data security; security comparison; vulnerabilities; CVSS

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.