Loading…

Cross-Boundary Enterprise Security Monitoring

The cyber threat landscape is evolving at a much faster rate than corporate cyber defenses are. Malicious actors have become more audacious in their exploit attempts during the past two years as evidenced by the growing number of publicly acknowledged breaches in the commercial and industrial sector...

Full description

Saved in:
Bibliographic Details
Main Authors: Yale Li, Yudong Liu, Huakai Zhang
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The cyber threat landscape is evolving at a much faster rate than corporate cyber defenses are. Malicious actors have become more audacious in their exploit attempts during the past two years as evidenced by the growing number of publicly acknowledged breaches in the commercial and industrial sectors. Motivations range the gamut from "hacktivism" to corporate espionage. This paper will discuss one possible approach to defending against malicious actors at an enterprise level. The proposed approach is based on cross-boundary information security management and the fusion of enterprise-wide security data.
DOI:10.1109/ICCPS.2012.6384332