Misuseablity analysis for IT infrastructure

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Today, organizations have limited resources available to allocate to the detection of complex cyber-attacks. In order to optimize their resource allocation, organizations must conduct a thorough risk analysis process so as to focus their efforts and resources on the protection of the organization's important assets. In this study we propose a framework that automatically and dynamically derives a misuseability score for every IT component (e.g., PC, laptop, server, router, smartphone, and user). The misuseability score encapsulates the potential damage that can be caused to the organization when its assets are compromised and misused. Copyright is held by the owner/author(s).

Original languageEnglish
Title of host publicationProceedings of the ACM Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages1496-1498
Number of pages3
ISBN (Print)9781450329576
DOIs
StatePublished - 3 Nov 2014
Event21st ACM Conference on Computer and Communications Security, CCS 2014 - Scottsdale, United States
Duration: 3 Nov 20147 Nov 2014

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference21st ACM Conference on Computer and Communications Security, CCS 2014
Country/TerritoryUnited States
CityScottsdale
Period3/11/147/11/14

Keywords

  • Insider threat
  • Misuseability score
  • Risk analysis
  • Security

Fingerprint

Dive into the research topics of 'Misuseablity analysis for IT infrastructure'. Together they form a unique fingerprint.

Cite this