• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Determining the Efficiency of Mitigations Based on Covered Threats
 
  • Details
  • Full
Options
2024
Conference Paper
Title

Determining the Efficiency of Mitigations Based on Covered Threats

Abstract
Prioritization of threats is an important skill for experts working in the cybersecurity field. With daily new discovered threats and a variety of tools providing information, warnings, and alerts, it is essential for experts working in cybersecurity to identify the most important warnings and threats and handle them efficiently to stay ahead of the growing competence, organization, and size of threat groups. To assist cybersecurity experts with these tasks, this paper provides an approach covering six steps that can be used to determine the efficiency of mitigations for a system under consideration. To this end, this paper describes a straightforward approach and provides an example in which it has already been used.
Author(s)
Winterstetter, Matthias  
Univ. Stuttgart, Institut für Arbeitswissenschaft und Technologiemanagement -IAT-  
Mainwork
Open Identity Summit 2024  
Conference
Open Identity Summit 2024  
Open Access
DOI
10.18420/OID2024_17
10.24406/publica-3287
File(s)
2024_Winterstetter_Determining the Efficiency.pdf (83.52 KB)
Rights
CC BY-SA 4.0: Creative Commons Attribution-ShareAlike
Language
English
Fraunhofer-Institut für Arbeitswirtschaft und Organisation IAO  
Keyword(s)
  • Cybersecurity

  • IT-Security

  • Mitigations

  • Threat Actors

  • Threat Groups

  • Mitigation Efficiency

  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024