@inproceedings{500e5002bc794a6dad9901c5c0112b0a,
title = "Misuseablity analysis for IT infrastructure",
abstract = "Today, organizations have limited resources available to allocate to the detection of complex cyber-attacks. In order to optimize their resource allocation, organizations must conduct a thorough risk analysis process so as to focus their efforts and resources on the protection of the organization's important assets. In this study we propose a framework that automatically and dynamically derives a misuseability score for every IT component (e.g., PC, laptop, server, router, smartphone, and user). The misuseability score encapsulates the potential damage that can be caused to the organization when its assets are compromised and misused. Copyright is held by the owner/author(s).",
keywords = "Insider threat, Misuseability score, Risk analysis, Security",
author = "Asaf Shabtai and Yuval Elovici",
year = "2014",
month = nov,
day = "3",
doi = "https://doi.org/10.1145/2660267.2662385",
language = "American English",
isbn = "9781450329576",
series = "Proceedings of the ACM Conference on Computer and Communications Security",
pages = "1496--1498",
booktitle = "Proceedings of the ACM Conference on Computer and Communications Security",
note = "21st ACM Conference on Computer and Communications Security, CCS 2014 ; Conference date: 03-11-2014 Through 07-11-2014",
}