Research Article
Risk-Based Dynamic Identity Authentication Method Based on the UCON Model
| Level | Value | Extent | Introduction |
| V | 80–100 | Very dangerous | Vulnerabilities that access system permission directly | IV | 60–80 | Dangerous | Sensitive information is leaked or visited without authorization | III | 40–60 | Moderately dangerous | Causing Web application denial of service | II | 20–40 | Slightly dangerous | Causing denial of service locally or leaking general information | I | 0–20 | Almost safe | General CSRF or URL jumping |
|
|