Techniques are provided to quantify the security impact of network vulnerabilities (e.g., hardware, software, configuration, etc.) on network applications running in the network and vice versa. The security impact quantification may be calculated by combining the vulnerability reach index (i.e. how far in the network does the impact of a vulnerability extend) with the security breach probability (i.e. the probability of accessing the network elements belonging to one network application from another network application).

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.