語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber Threat Alert Fatigue and Reduc...
~
ProQuest Information and Learning Co.
Cyber Threat Alert Fatigue and Reduction Methods.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Cyber Threat Alert Fatigue and Reduction Methods./
作者:
Lundy, Freda.
面頁冊數:
1 online resource (82 pages)
附註:
Source: Masters Abstracts International, Volume: 57-02.
標題:
Information technology. -
電子資源:
click for full text (PQDT)
ISBN:
9780355541694
Cyber Threat Alert Fatigue and Reduction Methods.
Lundy, Freda.
Cyber Threat Alert Fatigue and Reduction Methods.
- 1 online resource (82 pages)
Source: Masters Abstracts International, Volume: 57-02.
Thesis (M.S.)--Utica College, 2017.
Includes bibliographical references
The purpose of this exploratory study was to identify the cause and effect of alert fatigue and reduction methods, in order to improve cyber defense. A multidisciplinary approach using cognitive psychology and signal theory as the theoretical framework and clinical decision support systems as a conceptual model was applied. This approach satisfied the advisement by many studies to incorporate a socio-technical framework to human-machine interaction in cybersecurity settings. Despite state-of-the-art intrusion detection systems (IDS), cybercrime is on the rise, and data breaches are continually making headlines. Spending more money and hiring more cyber threat analysts are no longer adequate solutions. Studies have identified that alert fatigue is a major reason for successful data breaches. Alert fatigue is a phenomenon which is experienced by cyber threat analysts where alert overload affects their performance to detect and adequately respond to potential attacks. False positive alerts are a major contributor to the flood of alerts from IDS and hence alert fatigue. Based on the literature reviews, several alert detection methods were identified ranging in difficulty for implementation. The simplest methods are based in human factors such as integrated multiple threat data sources; using consistent, coordinated, and integrated IDS, and using audible alerts. A moderate method to immediately employ is deleting duplicate signatures. Last, a more complex method is to calibrate the specificity and sensitivity of the IDS according to the company's security policy and finance model.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355541694Subjects--Topical Terms:
559429
Information technology.
Index Terms--Genre/Form:
554714
Electronic books.
Cyber Threat Alert Fatigue and Reduction Methods.
LDR
:02718ntm a2200325K 4500
001
912599
005
20180608112134.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355541694
035
$a
(MiAaPQ)AAI10688778
035
$a
(MiAaPQ)utica:11143
035
$a
AAI10688778
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Lundy, Freda.
$3
1185036
245
1 0
$a
Cyber Threat Alert Fatigue and Reduction Methods.
264
0
$c
2017
300
$a
1 online resource (82 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 57-02.
500
$a
Advisers: Albert Orbinati; Harry Cooper.
502
$a
Thesis (M.S.)--Utica College, 2017.
504
$a
Includes bibliographical references
520
$a
The purpose of this exploratory study was to identify the cause and effect of alert fatigue and reduction methods, in order to improve cyber defense. A multidisciplinary approach using cognitive psychology and signal theory as the theoretical framework and clinical decision support systems as a conceptual model was applied. This approach satisfied the advisement by many studies to incorporate a socio-technical framework to human-machine interaction in cybersecurity settings. Despite state-of-the-art intrusion detection systems (IDS), cybercrime is on the rise, and data breaches are continually making headlines. Spending more money and hiring more cyber threat analysts are no longer adequate solutions. Studies have identified that alert fatigue is a major reason for successful data breaches. Alert fatigue is a phenomenon which is experienced by cyber threat analysts where alert overload affects their performance to detect and adequately respond to potential attacks. False positive alerts are a major contributor to the flood of alerts from IDS and hence alert fatigue. Based on the literature reviews, several alert detection methods were identified ranging in difficulty for implementation. The simplest methods are based in human factors such as integrated multiple threat data sources; using consistent, coordinated, and integrated IDS, and using audible alerts. A moderate method to immediately employ is deleting duplicate signatures. Last, a more complex method is to calibrate the specificity and sensitivity of the IDS according to the company's security policy and finance model.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Information technology.
$3
559429
650
4
$a
Computer science.
$3
573171
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0489
690
$a
0984
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Utica College.
$b
Cybersecurity.
$3
1148527
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10688778
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入