Logo des Repositoriums
 

Determining the Efficiency of Mitigations Based on Covered Threats

dc.contributor.authorWinterstetter, Matthias
dc.contributor.editorRoßnagel, Heiko
dc.contributor.editorSchunck, Christian H.
dc.contributor.editorSousa, Filipe
dc.date.accessioned2024-06-07T08:59:57Z
dc.date.available2024-06-07T08:59:57Z
dc.date.issued2024
dc.description.abstractPrioritization of threats is an important skill for experts working in the cybersecurity field. With daily new discovered threats and a variety of tools providing information, warnings, and alerts, it is essential for experts working in cybersecurity to identify the most important warnings and threats and handle them efficiently to stay ahead of the growing competence, organization, and size of threat groups. To assist cybersecurity experts with these tasks, this paper provides an approach covering six steps that can be used to determine the efficiency of mitigations for a system under consideration. To this end, this paper describes a straightforward approach and provides an example in which it has already been used.en
dc.identifier.doi10.18420/OID2024_17
dc.identifier.isbn978-3-88579-744-9
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/44097
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofOpen Identity Summit 2024
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-350
dc.subjectCybersecurity
dc.subjectIT-Security
dc.subjectMitigations
dc.subjectThreat Actors
dc.subjectThreat Groups
dc.subjectMitigation Efficiency.
dc.titleDetermining the Efficiency of Mitigations Based on Covered Threatsen
dc.typeText/Conference Paper
gi.citation.endPage188
gi.citation.publisherPlaceBonn
gi.citation.startPage183
gi.conference.date20.-21. June 2024
gi.conference.locationPorto, Portugal
gi.conference.sessiontitleShort Paper

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
proceedings-17.pdf
Größe:
83.52 KB
Format:
Adobe Portable Document Format