Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cyber Threat Alert Fatigue and Reduc...
~
ProQuest Information and Learning Co.
Cyber Threat Alert Fatigue and Reduction Methods.
Record Type:
Language materials, manuscript : Monograph/item
Title/Author:
Cyber Threat Alert Fatigue and Reduction Methods./
Author:
Lundy, Freda.
Description:
1 online resource (82 pages)
Notes:
Source: Masters Abstracts International, Volume: 57-02.
Subject:
Information technology. -
Online resource:
click for full text (PQDT)
ISBN:
9780355541694
Cyber Threat Alert Fatigue and Reduction Methods.
Lundy, Freda.
Cyber Threat Alert Fatigue and Reduction Methods.
- 1 online resource (82 pages)
Source: Masters Abstracts International, Volume: 57-02.
Thesis (M.S.)--Utica College, 2017.
Includes bibliographical references
The purpose of this exploratory study was to identify the cause and effect of alert fatigue and reduction methods, in order to improve cyber defense. A multidisciplinary approach using cognitive psychology and signal theory as the theoretical framework and clinical decision support systems as a conceptual model was applied. This approach satisfied the advisement by many studies to incorporate a socio-technical framework to human-machine interaction in cybersecurity settings. Despite state-of-the-art intrusion detection systems (IDS), cybercrime is on the rise, and data breaches are continually making headlines. Spending more money and hiring more cyber threat analysts are no longer adequate solutions. Studies have identified that alert fatigue is a major reason for successful data breaches. Alert fatigue is a phenomenon which is experienced by cyber threat analysts where alert overload affects their performance to detect and adequately respond to potential attacks. False positive alerts are a major contributor to the flood of alerts from IDS and hence alert fatigue. Based on the literature reviews, several alert detection methods were identified ranging in difficulty for implementation. The simplest methods are based in human factors such as integrated multiple threat data sources; using consistent, coordinated, and integrated IDS, and using audible alerts. A moderate method to immediately employ is deleting duplicate signatures. Last, a more complex method is to calibrate the specificity and sensitivity of the IDS according to the company's security policy and finance model.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355541694Subjects--Topical Terms:
559429
Information technology.
Index Terms--Genre/Form:
554714
Electronic books.
Cyber Threat Alert Fatigue and Reduction Methods.
LDR
:02718ntm a2200325K 4500
001
912599
005
20180608112134.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355541694
035
$a
(MiAaPQ)AAI10688778
035
$a
(MiAaPQ)utica:11143
035
$a
AAI10688778
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Lundy, Freda.
$3
1185036
245
1 0
$a
Cyber Threat Alert Fatigue and Reduction Methods.
264
0
$c
2017
300
$a
1 online resource (82 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 57-02.
500
$a
Advisers: Albert Orbinati; Harry Cooper.
502
$a
Thesis (M.S.)--Utica College, 2017.
504
$a
Includes bibliographical references
520
$a
The purpose of this exploratory study was to identify the cause and effect of alert fatigue and reduction methods, in order to improve cyber defense. A multidisciplinary approach using cognitive psychology and signal theory as the theoretical framework and clinical decision support systems as a conceptual model was applied. This approach satisfied the advisement by many studies to incorporate a socio-technical framework to human-machine interaction in cybersecurity settings. Despite state-of-the-art intrusion detection systems (IDS), cybercrime is on the rise, and data breaches are continually making headlines. Spending more money and hiring more cyber threat analysts are no longer adequate solutions. Studies have identified that alert fatigue is a major reason for successful data breaches. Alert fatigue is a phenomenon which is experienced by cyber threat analysts where alert overload affects their performance to detect and adequately respond to potential attacks. False positive alerts are a major contributor to the flood of alerts from IDS and hence alert fatigue. Based on the literature reviews, several alert detection methods were identified ranging in difficulty for implementation. The simplest methods are based in human factors such as integrated multiple threat data sources; using consistent, coordinated, and integrated IDS, and using audible alerts. A moderate method to immediately employ is deleting duplicate signatures. Last, a more complex method is to calibrate the specificity and sensitivity of the IDS according to the company's security policy and finance model.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Information technology.
$3
559429
650
4
$a
Computer science.
$3
573171
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0489
690
$a
0984
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Utica College.
$b
Cybersecurity.
$3
1148527
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10688778
$z
click for full text (PQDT)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login