5 211 access vector av

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: .1 Access Vector (AV) .........................................................................................5 2.1.2 Access Complexity (AC)..................................................................................5 2.1.3 Authentication (AU) .........................................................................................6 2.1.4 Confidentiality Impact (C) ................................................................................7 2.1.5 Integrity Impact (I)............................................................................................7 2.1.6 Availability Impact (A) ......................................................................................8 Temporal Metrics ........................................................................................................ 8 2.2.1 Exploitability (E)...............................................................................................8 2.2.2 Remediation Level (RL)...................................................................................9 2.2.3 Report Confidence (RC) ..................................................................................9 Environmental Metrics .............................................................................................. 10 2.3.1 Collateral Damage Potential (CDP)...............................................................10 2.3.2 Target Distribution (TD) .................................................................................10 2.3.3 Security Requirements (CR, IR, AR) .............................................................11 Base, Temporal, Environmental Vectors .................................................................. 12 Scoring...............................................................................................................................13 3.1 3.2 3.3 4. What is CVSS? ........................................................................................................... 1 Other Vulnerability Scoring Systems .......................................................................... 2 How Does CVSS Work? ............................................................................................. 2 Who Performs the Scoring?........................................................................................ 3 Who Owns CVSS?...................................................................................................... 3 Who is Using CVSS? .................................................................................................. 4 Quick Definitions ......................................................................................................... 4 Guidelines ................................................................................................................. 13 3.1.1 General..........................................................................................................13 3.1.2 Base Metrics................................
View Full Document

This document was uploaded on 03/19/2014 for the course IS 4799 at ITT Tech Flint.

Ask a homework question - tutors are online