27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

David Merritt and Barry Mullins<br />

Essentially, summing the individual weighted scores yields a “grade” for intrusion, malware, and<br />

exfiltration classification taken within the context of one another. For the purpose of this paper, a<br />

notional α multiplier of 2 and a β multiplier of 3 are used to illustrate the effectiveness and flexibility of<br />

this synthesis approach. Operationally, these values can be fine-tuned and adjusted as needed.<br />

However, this score has little value without a translation to what it could mean. The EPM score is<br />

used in the Espionage Threshold Matrix (ETM), shown in Table 2.<br />

Table 2: Espionage Threshold Matrix (ETM), assuming α=2 and β=3<br />

Overall Probability of<br />

Cyber Espionage<br />

EPM Score<br />

High Probability ≥12<br />

Medium Probability ≥9<br />

Low Probability

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!