Title :
Cross-Boundary Enterprise Security Monitoring
Author :
Li, Yale ; Liu, Yudong ; Zhang, Huakai
Author_Institution :
Microsoft, Redmond, WA, USA
Abstract :
The cyber threat landscape is evolving at a much faster rate than corporate cyber defenses are. Malicious actors have become more audacious in their exploit attempts during the past two years as evidenced by the growing number of publicly acknowledged breaches in the commercial and industrial sectors. Motivations range the gamut from “hacktivism” to corporate espionage. This paper will discuss one possible approach to defending against malicious actors at an enterprise level. The proposed approach is based on cross-boundary information security management and the fusion of enterprise-wide security data.
Keywords :
business data processing; organisational aspects; security of data; commercial sectors; corporate cyber defenses; cross-boundary enterprise security monitoring; cross-boundary information security management; cyber threat landscape; enterprise level; hacktivism; industrial sectors; malicious actors; publicly acknowledged breaches; Context; Correlation; Databases; Government; Monitoring; Security; cross-boundary; cyber defense; cyber threat; enterprise security monitoring;
Conference_Titel :
Computational Problem-Solving (ICCP), 2012 International Conference on
Conference_Location :
Leshan
Print_ISBN :
978-1-4673-1696-5
Electronic_ISBN :
978-1-4673-1695-8
DOI :
10.1109/ICCPS.2012.6384332