Logo des Repositoriums
 
Konferenzbeitrag

Determining the Efficiency of Mitigations Based on Covered Threats

Lade...
Vorschaubild

Volltext URI

Dokumententyp

Text/Conference Paper

Zusatzinformation

Datum

2024

Zeitschriftentitel

ISSN der Zeitschrift

Bandtitel

Verlag

Gesellschaft für Informatik e.V.

Zusammenfassung

Prioritization of threats is an important skill for experts working in the cybersecurity field. With daily new discovered threats and a variety of tools providing information, warnings, and alerts, it is essential for experts working in cybersecurity to identify the most important warnings and threats and handle them efficiently to stay ahead of the growing competence, organization, and size of threat groups. To assist cybersecurity experts with these tasks, this paper provides an approach covering six steps that can be used to determine the efficiency of mitigations for a system under consideration. To this end, this paper describes a straightforward approach and provides an example in which it has already been used.

Beschreibung

Winterstetter, Matthias (2024): Determining the Efficiency of Mitigations Based on Covered Threats. Open Identity Summit 2024. DOI: 10.18420/OID2024_17. Bonn: Gesellschaft für Informatik e.V.. PISSN: 1617-5468. ISBN: 978-3-88579-744-9. pp. 183-188. Short Paper. Porto, Portugal. 20.-21. June 2024

Zitierform

Tags