Research Article
Big Data-Driven Hierarchical Local Area Network Security Risk Event Prediction Algorithm
Table 2
Materiality calculation information risk description.
| Calculation name | Information risk content | Vulnerability value |
| Access Vector 0 | No effect N/Partial effect P/Full effect F | 1.05 | Access Vector 1 | No effect N/Partial effect P/Full effect F | 0.32 | Access Vector 2 | No effect N/Partial effect P/Full effect F | 0.49 | Access Vector 3 | No effect N/Partial effect P/Full effect F | 1.92 | Access Complexity 1 | No effect N/Partial effect P/Full effect F | -2.63 | Access Complexity 2 | No effect N/Partial effect P/Full effect F | -0.41 | Access Complexity 3 | No effect N/Partial effect P/Full effect F | 0.25 | Authentication 1 | No effect N/Partial effect P/Full effect F | 0.71 | Authentication 2 | No effect N/Partial effect P/Full effect F | 0.76 | Authentication 3 | No effect N/Partial effect P/Full effect F | 0.17 |
|
|