4
Associate-Information Security Manager, The Goldman Sachs Group, Inc., Dallas, Texas, USA
Abstract
This paper discusses the development, usability, and prospects of the Coordinated Vulnerability Disclosure (CVD) models in cybersecurity practice and use. The vulnerability disclosure is a process that enables the discovery and reporting of security flaws within software systems and is crucial in countering the onslaught of cyber threats. The study contrasts lower historical designs, such as Full Disclosure and Responsible Disclosure, with the CVD model because it provides a partnership among security researchers, vendors, and end-users to tackle vulnerabilities quickly and openly. CVD seeks to maximize exploitation prevention to release patches as fast as possible. Television commercials, CVD still experiences some barriers such as communication gaps, legal obscurity, and slow delivery of patches. As directions of future work, it is possible to expand the scope of the investigation by studying different geographies, sectors, and the natures of vulnerabilities, by including AI-related models into vulnerability triaging, and contributing to policy formation across nations aimed at harmonizing the disclosure policies. The improvement of vulnerability detection and tracking, which would enhance transparency and security, could be achieved through technological progress, especially when it comes to machine learning and other blockchain contributions. The third-party vendors, consumers, and ethical hackers will also contribute to the enhanced effectiveness of CVD models since they will establish stronger links between public-private collaboration. Through such areas, the study will contribute to the development of more effective, internationally accepted, and safe systems of vulnerability management that can alleviate the current levels of cybersecurity complexities. The lessons underline the importance of trust, communication, and international collaboration for a successful coordinated vulnerability disclosure.
How to Cite
Gaurav Malik. (2024). From Discovery to Disclosure: A Policy Analysis of Coordinated Vulnerability Disclosure Models. Frontiers in Emerging Computer Science and Information Technology, 1(2), 01–28. Retrieved from https://irjernet.com/index.php/fecsit/article/view/190
📄Ahmed, A., Deokar, A., & Lee, H. C. B. (2021). Vulnerability disclosure mechanisms: A synthesis and framework for market-based and non-market-based disclosures. Decision Support Systems, 148, 113586.
📄Alizadeh, G., Gholipour, K., Azami-Aghdash, S., Dehnavieh, R., JafarAbadi, M. A., Azmin, M., & Khodayari-Zarnaq, R. (2022). Social, economic, technological, and environmental factors affecting cardiovascular diseases: a systematic review and thematic analysis. International Journal of Preventive Medicine, 13(1), 78.
📄Almansour, H. A., Aloudah, N. M., Alhawassi, T. M., Chaar, B., Krass, I., & Saini, B. (2020). Health consumer engagement in developing novel preventive health community pharmacy roles in cardiovascular disease in Saudi Arabia: a qualitative analysis. Saudi Pharmaceutical Journal, 28(5), 529-537.
📄Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.
📄Blessing, J., Specter, M. A., & Weitzner, D. J. (2021). You really shouldn't roll your own crypto: An empirical study of vulnerabilities in cryptographic libraries. arXiv preprint arXiv:2107.04940.
📄Kaul, D., & Khurana, R. (2021). AI to detect and mitigate security vulnerabilities in APIs: encryption, authentication, and anomaly detection in enterprise-level distributed systems. Eigenpub Review of Science and Technology, 5(1), 34-62.
📄Kim, S. K., Kim, U. M., & Huh, J. H. (2019). A study on improvement of blockchain application to overcome vulnerability of IoT multiplatform security. Energies, 12(3), 402.
📄Kitchin, R., & Dodge, M. (2020). The (in) security of smart cities: Vulnerabilities, risks, mitigation, and prevention. In Smart cities and innovative Urban technologies (pp. 47-65). Routledge.
📄McIlvennan, C. K., Morris, M. A., Guetterman, T. C., Matlock, D. D., & Curry, L. (2019). Qualitative methodology in cardiovascular outcomes research: a contemporary look. Circulation: Cardiovascular Quality and Outcomes, 12(9), e005828.
📄Möller, D. P. (2023). NIST cybersecurity framework and MITRE cybersecurity criteria. In Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices (pp. 231-271). Cham: Springer Nature Switzerland.
📄Nyati, S. (2018). Revolutionizing LTL carrier operations: A comprehensive analysis of an algorithm-driven pickup and delivery dispatching solution. International Journal of Science and Research (IJSR), 7(2), 1659-1666. Retrieved from https://www.ijsr.net/getabstract.php?paperid=SR24203183637
📄Riedel, A., Messenger, D., Fleischman, D., & Mulcahy, R. (2022). Consumers experiencing vulnerability: a state of play in the literature. Journal of Services Marketing, 36(2), 110-128.
📄Roger, V. L., Sidney, S., Fairchild, A. L., Howard, V. J., Labarthe, D. R., Shay, C. M., ... & American Heart Association Advocacy Coordinating Committee. (2020). Recommendations for cardiovascular health and disease surveillance for 2030 and beyond: a policy statement from the American Heart Association. Circulation, 141(9), e104-e119.
📄Saquella, A. J. (2020). PERSONAL DATA VULNERABILITY. Jurimetrics, 60(2), 215-245.
📄Sardana, J. (2022). Scalable systems for healthcare communication: A design perspective. International Journal of Science and Research Archive. https://doi.org/10.30574/ijsra.2022.7.2.0253
📄Shinbrot, X. A., Jones, K. W., Rivera-Castañeda, A., López-Báez, W., & Ojima, D. S. (2019). Smallholder farmer adoption of climate-related adaptation strategies: the importance of vulnerability context, livelihood assets, and climate perceptions. Environmental management, 63(5), 583-595.
📄Singh, V. (2023). Enhancing object detection with self-supervised learning: Improving object detection algorithms using unlabeled data through self-supervised techniques. International Journal of Advanced Engineering and Technology. https://romanpub.com/resources/Vol%205%20%2C%20No%201%20-%2023.pdf
📄Sourav, M. S. A., Khan, M. I., & Akash, T. R. (2020). Data Privacy Regulations and Their Impact on Business Operations: A Global Perspective. Journal of Business and Management Studies, 2(1), 49-67.
📄Swift, O., Colon, R., & Davis, K. (2020). The impact of cyber breaches on the content of cybersecurity disclosures. Journal of Forensic and Investigative Accounting, 12(2), 197-212.
📄Ullah, M., Hamayun, S., Wahab, A., Khan, S. U., Rehman, M. U., Haq, Z. U., ... & Naeem, M. (2023). Smart technologies used as smart tools in the management of cardiovascular disease and their future perspective. Current Problems in Cardiology, 48(11), 101922.
📄Von Stockhausen, H. M., & Rose, M. (2020, March). Continuous security patch delivery and risk management for medical devices. In 2020 IEEE International Conference on Software Architecture Companion (ICSA-C) (pp. 204-209). IEEE.
📄Walshe, T., & Simpson, A. C. (2022). Coordinated vulnerability disclosure programme effectiveness: Issues and recommendations. Computers & Security, 123, 102936.
📄Wellnhofer, E. (2022). Real-world and regulatory perspectives of artificial intelligence in cardiovascular imaging. Frontiers in cardiovascular medicine, 9, 890809.
📄Wilneff, L. (2023). “So” what? Why the Supreme Court’s narrow interpretation of the computer fraud and abuse act in Van Buren v. United States has drastic effects. Loyola University Chicago Law Journal, 54(5), 1.
📄Xiong, S., Jiang, W., Meng, R., Hu, C., Liao, H., Wang, Y., ... & Tian, M. (2023). Factors associated with the uptake of national essential public health service package for hypertension and type-2 diabetes management in China's primary health care system: a mixed-methods study. The Lancet Regional Health–Western Pacific, 31.
📄Yaacoub, J. P. A., Noura, H. N., Salman, O., & Chehab, A. (2021). A survey on ethical hacking: issues and challenges. arXiv preprint arXiv:2103.15072.
📄Zhao, L., Yang, M. M., Wang, Z., & Michelson, G. (2023). Trends in the dynamic evolution of corporate social responsibility and leadership: A literature review and bibliometric analysis. Journal of Business Ethics, 182(1), 135-157.