Research Article

Risk-Based Dynamic Identity Authentication Method Based on the UCON Model

Table 4

Level of vulnerability.

LevelValueExtentIntroduction

V80–100Very dangerousVulnerabilities that access system permission directly
IV60–80DangerousSensitive information is leaked or visited without authorization
III40–60Moderately dangerousCausing Web application denial of service
II20–40Slightly dangerousCausing denial of service locally or leaking general information
I0–20Almost safeGeneral CSRF or URL jumping