Article
Version 1
Preserved in Portico This version is not peer-reviewed
S3: Security Score System
Version 1
: Received: 6 December 2023 / Approved: 12 December 2023 / Online: 12 December 2023 (04:58:05 CET)
How to cite: Valadares, D.; Santos, D.; Perkusich, A. S3: Security Score System. Preprints 2023, 2023120776. https://doi.org/10.20944/preprints202312.0776.v1 Valadares, D.; Santos, D.; Perkusich, A. S3: Security Score System. Preprints 2023, 2023120776. https://doi.org/10.20944/preprints202312.0776.v1
Abstract
Security in the Internet of Things (IoT) is a critical concern due to the growing number of connected devices and the limited resources to implement robust security mechanisms in most of them. Adopting standard assessment frameworks, such as CVSS (Common Vulnerability Score System), allows for systematic vulnerability assessment. At the same time, CVE (Common Vulnerabilities and Exposures) records provide unique identifiers for known security issues, making it easier to share information. However, comparing security solutions is still challenging due to the diverse nature of IoT devices and the ever-evolving threat landscape, requiring continual innovation and collaboration between stakeholders. Furthermore, there still needs to be a simple way to compare technologies and solutions, taking into account the security provided by them. In this sense, in this article, we propose a tool for calculating a security score based on the CVSS index of each existing vulnerability in a given technology. We explain how the tool performs the calculation, discuss some challenges, and propose improvements for future work.
Keywords
data security; security comparison; vulnerabilities; CVSS
Subject
Computer Science and Mathematics, Security Systems
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment