• 0 Posts
  • 12 Comments
Joined 2 years ago
cake
Cake day: June 2nd, 2023

help-circle
  • SpacePirate@lemmy.mltoProton @lemmy.worldProton CEO goes full MAGA
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    4
    ·
    edit-2
    7 months ago

    If you think you can stop using products of companies whose executives support the Republican Party, you’re quickly going to find yourself in the Stone Age.

    Nearly every corporate executive, for nearly every company, is likely to be a Republican.

    Even Tim Cook, an outspoken homosexual who has previously been the target of Trump-led MAGA vitriol, just recently expressed support and donated a million dollars to Trump.

    People will just posture and harumph, yet keep buying Samsung, Google, and Apple cell phones, or use Enamel baby formula, or eat meat and vegetables grown using John Deere and Monsanto products…

    I could go on, but there is no need to depress myself.




    1. From the title of your article and your executive summary, the premise of your paper is that CVSS is flawed, and CITE is your solution.
    2. From the title of your article, and choice of name, “QHE CVSS Alternative; CITE”. CVSS is a VULNERABILITY Scoring System. CITE, as your propose, is a THREAT evaluation tool. You can see how one could have the impression that they were incorrectly being used interchangeably.

    As you yourself stated, CVSS does exactly what it says on the box. It provides a singular rating for a software vulnerability, in a vacuum. It does not prescribe to do anything more, and it does a good job doing what it sets out to do (including specifically as an input to other quantitative risk calculations).

    Compare what with attack?

    Your methodology heavily relies on “the analysis of cybersecurity experts”, and in particular, frequently references “exploit chains”, mappings which are not clearly defined, and appears to rely on the knowledge of the individual practitioner, rather than existing open frameworks. MITRE ATT&CK and CAPEC already provide such a mapping, as well as a list of threat actor groups leveraging tactics, techniques, and procedures (e.g., exploitation of a given CVE). Here’s a good articlewhich maps similarly to how we operate our cybersecurity program.

    I think there is a lot on the mark in your article about the issues with cybersecurity today, but again, I believe that your premise that CVSS needs replacing is flawed, and I don’t think you provided a compelling case to demonstrate how/why it is flawed. If anything, I think you would agree that if organizations are exclusively using CVSS scores to prioritize remediation, they’re doing it wrong, and fighting an impossible battle. But this means the organization’s approach is wrong, not CVSS itself.

    Your article stands better alone as a proposal for a methodology for quantifying risk and threat to an organization (or society?), rather than as a takedown of CVSS.