Common Vulnerabilities and Exposures from Emails

Authors

  • Falak Ussien Hasan Faculty of Mathematics and Informatics, Sofia University "St. Kliment Ohridski", Bulgaria

DOI:

https://doi.org/10.55630/sjc.2020.14.51-63

Keywords:

Mail Weaknesses, Ontology Concepts, Ontology Principles, Weaknesses, Weakness Concepts

Abstract

Ontologies are used for knowledge management, concept definition and semantic search. Ontology is applicable to the organization and management of knowledge in a single given domain. This paper is an attempt to construct a knowledge base for email vulnerabilities using ontologies. It presents a method of building relations among CVEs email entries as established by the MITRE Corporation’s weaknesses data base. The use of ontology is illustrated with queries analyzing software products from a security manager's point of view. This work is based on the MITRE community effort CWE List, Version 3.1—Research concept view CWE-1000.

Downloads

Published

2021-10-12

Issue

Section

Articles