FIGURE 2 - available via license: Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International
Content may be subject to copyright.
Source publication
Many organizations and researchers, such as NIST, FIRST, MITRE, etc. in the United States, are conducting various cybersecurity research to counter the evolving cyber threats. Research on improving the security level of systems and networks by checking the network environment is one of the main areas of continuous research. To choose the right secu...
Context in source publication
Context 1
... a result, to ensure fair and accurate assessments, the U.S. Chamber of Commerce has adopted six principles to guide its security ratings. These principles are shown in Figure 2. As a security rating company, BitSight uses data that feeds into a proprietary algorithm based on the six principles to generate a security score ranging from 250 to 900. ...
Similar publications
To improve cyber threat analysis practices in cybersecurity, I present a plan to build a formal ontological representation of state actors in cyberspace and of cyber operations. I argue that modelling these phenomena via ontologies allows for coherent integration of data coming from diverse sources, automated reasoning over such data, as well as in...