skip to main content
10.1145/3465481.3469202acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

GEIGER: Solution for small businesses to protect themselves against cyber-threats

Published: 17 August 2021 Publication History

Abstract

In a world where cybersecurity has an increasing importance, any company, regardless of what sector, size or activity is related to, should rely on tools and solutions that can help it to be secure in the best possible way. The GEIGER platform described in this paper acts as a perfect fit for micro and small enterprises (MSEs). These companies need to be protected against threats but sometimes do not have the resources (money, personnel, time…) to deal with them. Often, private cybersecurity solutions are either expensive or hard to implement for micro and small companies. However, GEIGER is designed to bring cybersecurity principles, security countermeasures and awareness in a smooth and friendly way, with special focus on the MSEs. Its ability to adapt to new challenges comes in handy when dealing with sophisticated threats and the functionalities provided to help MSEs adopting a more prominent security posture. Having the support of an innovative solution can help MSEs to achieve a more effective approach regarding cybersecurity, which leads to a better overall business management and operation.

References

[1]
Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, and Umberto Villano. 2019. Toward the Automation of Threat Modeling and Risk Assessment in IoT Systems. Internet of Things 7 (Sept. 2019), 100056. https://doi.org/10.1016/j.iot.2019.100056
[2]
European DIGITAL SME Alliance. 2020. The EU Cybersecurity Act and the Role of Standards for SMEs - Position Paper. Technical Report. Brussels.
[3]
Yang Liu, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh, Manish Karir, Michael Bailey, and Mingyan Liu. 2015. Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. In 24th {USENIX} Security Symposium ({USENIX} Security 15). 1009–1024.
[4]
Michael Muckin and Scott C. Fitch. 2019. A Threat-Driven Approach to Cyber Security. Technical Report. Lockheed Martin Corporation. 45 pages.
[5]
Richard P. Lippmann and James F. Riordan. 2016. Threat-based risk assessment for enterprise networks. Lincoln Lab. J, 22(1), 33-45.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security
August 2021
1447 pages
ISBN:9781450390514
DOI:10.1145/3465481
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 August 2021

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ARES 2021

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 163
    Total Downloads
  • Downloads (Last 12 months)30
  • Downloads (Last 6 weeks)3
Reflects downloads up to 17 Oct 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media