Options
2024
Conference Paper
Title
Determining the Efficiency of Mitigations Based on Covered Threats
Abstract
Prioritization of threats is an important skill for experts working in the cybersecurity field. With daily new discovered threats and a variety of tools providing information, warnings, and alerts, it is essential for experts working in cybersecurity to identify the most important warnings and threats and handle them efficiently to stay ahead of the growing competence, organization, and size of threat groups. To assist cybersecurity experts with these tasks, this paper provides an approach covering six steps that can be used to determine the efficiency of mitigations for a system under consideration. To this end, this paper describes a straightforward approach and provides an example in which it has already been used.
Conference
Open Access
Rights
CC BY-SA 4.0: Creative Commons Attribution-ShareAlike
Language
English