Determining the Efficiency of Mitigations Based on Covered Threats
dc.contributor.author | Winterstetter, Matthias | |
dc.contributor.editor | Roßnagel, Heiko | |
dc.contributor.editor | Schunck, Christian H. | |
dc.contributor.editor | Sousa, Filipe | |
dc.date.accessioned | 2024-06-07T08:59:57Z | |
dc.date.available | 2024-06-07T08:59:57Z | |
dc.date.issued | 2024 | |
dc.description.abstract | Prioritization of threats is an important skill for experts working in the cybersecurity field. With daily new discovered threats and a variety of tools providing information, warnings, and alerts, it is essential for experts working in cybersecurity to identify the most important warnings and threats and handle them efficiently to stay ahead of the growing competence, organization, and size of threat groups. To assist cybersecurity experts with these tasks, this paper provides an approach covering six steps that can be used to determine the efficiency of mitigations for a system under consideration. To this end, this paper describes a straightforward approach and provides an example in which it has already been used. | en |
dc.identifier.doi | 10.18420/OID2024_17 | |
dc.identifier.isbn | 978-3-88579-744-9 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/44097 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Open Identity Summit 2024 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-350 | |
dc.subject | Cybersecurity | |
dc.subject | IT-Security | |
dc.subject | Mitigations | |
dc.subject | Threat Actors | |
dc.subject | Threat Groups | |
dc.subject | Mitigation Efficiency. | |
dc.title | Determining the Efficiency of Mitigations Based on Covered Threats | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 188 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 183 | |
gi.conference.date | 20.-21. June 2024 | |
gi.conference.location | Porto, Portugal | |
gi.conference.sessiontitle | Short Paper |
Dateien
Originalbündel
1 - 1 von 1