Misuseablity analysis for IT infrastructure

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Today, organizations have limited resources available to allocate to the detection of complex cyber-attacks. In order to optimize their resource allocation, organizations must conduct a thorough risk analysis process so as to focus their efforts and resources on the protection of the organization's important assets. In this study we propose a framework that automatically and dynamically derives a misuseability score for every IT component (e.g., PC, laptop, server, router, smartphone, and user). The misuseability score encapsulates the potential damage that can be caused to the organization when its assets are compromised and misused. Copyright is held by the owner/author(s).

Original languageAmerican English
Title of host publicationProceedings of the ACM Conference on Computer and Communications Security
Pages1496-1498
Number of pages3
DOIs
StatePublished - 3 Nov 2014
Event21st ACM Conference on Computer and Communications Security, CCS 2014 - Scottsdale, United States
Duration: 3 Nov 20147 Nov 2014

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security

Conference

Conference21st ACM Conference on Computer and Communications Security, CCS 2014
Country/TerritoryUnited States
CityScottsdale
Period3/11/147/11/14

Keywords

  • Insider threat
  • Misuseability score
  • Risk analysis
  • Security

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Misuseablity analysis for IT infrastructure'. Together they form a unique fingerprint.

Cite this