Running head: COMMON WEAKNESS ENUMERATION Common Weakness Enumeration Name University 05/27/2020 COMMON WEAKNESS ENUMERATION 2 Today, software developers, security vendors, researchers, and application vendors must identify vulnerabilities in software before they are deployed. Since there are numerous weaknesses, the security professionals must prioritize the weaknesses to sort out first based on which poses the most significant risks. The most popular scoring system is the Common Weakness Scoring System (CWSS). The Common Weakness Scoring System (CWSS) provides a common framework for prioritizing weaknesses discovered in software (Martin, 2014). The common weakness scoring system is divided into three metric groups. First, base finding metric identifies risks posed by the vulnerability, strength of controls, and confidence in the accuracy of the results. Second, the attack surface identifies barriers to overcome in order to exploit the weakness, and lastly, the environmental metric identifies the characteristics of the vulnerabilities particular to a specific environment (Martin, 2014). All these metrics are combined to produce the CWSS score. Cross-Site Request Forgery is a vulnerability that allows attackers to lure users into acting unintentionally (Martin, 2014). For instance, an attacker might change the password, username, email address, or make funds transfer. Depending on the victim's action, the malicious actor might gain full control of the victim's account. In case the victim enjoys privileged roles, the attacker might obtain full control of the application data. Currently, it is challenging to detect cross-site request forgery using automated techniques since each of the applications has policies that dictate which requests can be influenced by an outsider (Martin, 2014). To prevent CrossSite Request Forgery attacks, businesses should transition from session-tracking cookies to session tokens that are dynamically generated (Martin, 2014). It is also advisable not to assume that site you're visiting has policies to prevent CSRF attacks. The following proactive measures can be taken to avoid CSRF attacks. First, install antivirus software and ensure it is up to date COMMON WEAKNESS ENUMERATION (Dargin, 2017). Second, avoid opening emails while authenticated to a site that performs financial transactions. Lastly, users are advised to disable scripting in their browser (Dargin, 2017). 3 COMMON WEAKNESS ENUMERATION 4 References Martin, B. (2014). CWE - Common Weakness Scoring System (CWSS). Retrieved 27 May 2020, from https://cwe.mitre.org/cwss/cwss_v1.0.1.html Dargin, M. (2017). How to protect against cross-site request forgery attacks. Retrieved 27 May 2020, from https://www.networkworld.com/article/3190444/how-to-protect-againstcross-site-request-forgery-attacks.html