Managing Cybersecurity Events Using Service-Level Agreements (SLAs) by Profiling the People Who Attack

C Peoples, J Rafferty, A Moore… - Advances in Cybersecurity …, 2021 - Springer
Security frameworks are used to determine the approach to managing a network that may be
under attack. The DREAD model from Microsoft, for example, promotes a strategy that is …

Security Metrics for Risk-aware Automated Policy Management

E Al-Shaer, L Khan, MS Ahmed… - … : From Concepts to …, 2010 - books.google.com
The factors on which security depends are of a dynamic nature. They include emergence of
new vulnerabilities and threats, policy structure, and network traffic. Therefore, evaluating …

Dynamic Threat Assessment for Prioritising Computer Network Security

MZ Hayat, JS Reeve, C Boutle - 2006 - eprints.soton.ac.uk
Large corporations today consist of heterogeneous IT networks with many thousands of
devices, which may use numerous physical and logical interfaces to communicate. Much …

[图书][B] Best Practice for Security Management

United Kingdom. Treasury. Office of Government … - 1999 - books.google.com
Page 1 TM Best Practice Introduction to ITIL® OGC Office of Government Commerce ITIL® The
key to Managing IT services Page 2 Page 3 Introduction to ITIL® Based on a product previously …

Security threat analysis and prevention towards attack strategies

S De - Cyber Defense Mechanisms, 2020 - taylorfrancis.com
Twentieth century is undergoing a huge change on businesses, end-users buying
commodities, and even how billion-dollar deals are finalized. Digitization has seen global …

Incident response

I Alsmadi, I Alsmadi - The NICE Cyber Security Framework: Cyber Security …, 2019 - Springer
Incident Response Page 1 331 © Springer Nature Switzerland AG 2019 I. Alsmadi, The NICE
Cyber Security Framework, https://doi.org/10.1007/978-3-030-02360-7_13 Chapter 13 Incident …

[PDF][PDF] Assessing Incident Severity in a Network and Automatic Defense Mechanisms

L Servin, T Dörges, KP Kossakowski - … Consulting GmbH, part of the POSITIF …, 2007 - first.org
Threat sources for computer networks are diverse and increasingly complex. Attackers make
use of vulnerabilities or configuration mistakes to pass through the external lines of defense …

Incident coordination

KM Moriarty - IEEE Security & Privacy, 2011 - computer.org
Incident Coordination Toggle navigation IEEE Computer Society Digital Library Jobs Tech News
Resource Center Press Room Advertising About Us IEEE IEEE Computer Society IEEE …

Threat and defense evasion modeling system and method

FS Artes, S Frei - US Patent 9,665,721, 2017 - Google Patents
BACKGROUND Currently, when trying to assess a computer/network security risk, key
stakeholders and decision makers are forced to work with non evidentiary data, often relying …

Using analytical network processes to create authorization, authentication, and accounting cyber security metrics

GC Wilamowski - 2017 - search.proquest.com
Cyber-attacks have escalated, causing decision makers to assess the trade-offs required to
protect their organizations from such attacks. The use of benchmarking techniques to reduce …