An Enhanced Threat Intelligence Driven Hybrid Model for Information Security Risk Management

被引:0
|
作者
Amin, Habib E. L. [1 ,2 ,3 ]
Samhat, Abed Ellatif [1 ]
Chamoun, Maroun [2 ]
Oueidat, Lina [1 ]
Feghali, Antoine [3 ]
机构
[1] Lebanese Univ, Fac Engn, CRSI, Beirut, Lebanon
[2] St Joseph Univ Beirut, Ecole Super Ingenieurs Beyrouth, Beirut, Lebanon
[3] POTECH Labs, Riyadh, Saudi Arabia
关键词
Cyber Security; Information Security; Risk Management; Cyber Threat Intelligence; CYBERSECURITY;
D O I
10.1109/WoWMoM60985.2024.00013
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Risk management (RM) frameworks were established to identify, evaluate, and treat information security risks. The hybrid model for information security risk assessment (RA) [1] outlines a systematic process encompassing threat analysis while remaining agnostic to the source of threat information. It is limited in its adaptability to threat changes and dynamics. In an evolving landscape of changing threats, traditional RM methodologies face limitations in dynamic adaptation without considering Cyber Threat Intelligence (CTI) information. In this paper, we overview the established frameworks and methodologies for RM and CTI to identify gaps in the established RM frameworks. We propose a novel enhancement to the hybrid model by integrating CTI. This enhancement distinguishes our approach from other frameworks by facilitating the proactive inclusion of context-rich external threat data, leading to a more efficient RM process that effectively adapts to the ever-evolving cyber threat landscape.
引用
收藏
页码:5 / 12
页数:8
相关论文
共 50 条
  • [1] INFORMATION SECURITY RISK MANAGEMENT: AN INTELLIGENCE- DRIVEN APPROACH
    Webb, Jeb
    Maynard, Sean
    Ahmad, Atif
    Shanks, Graeme
    [J]. AUSTRALASIAN JOURNAL OF INFORMATION SYSTEMS, 2014, 18 (03) : 391 - 404
  • [2] Integrating Threat Intelligence to Enhance an Organization's Information Security Management
    Gschwandtner, Mathias
    Demetz, Lukas
    Gander, Matthias
    Maier, Ronald
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [3] A Data-driven Assessment Model for Information Systems Security Risk Management
    Feng, Nan
    Yu, Xue
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (12) : 3103 - 3109
  • [4] Developing intelligence-based threat definitions for global information security management
    Korzyk, AD
    [J]. INFORMATION TECHNOLOGY AND ORGANIZATIONS: TRENDS, ISSUES, CHALLENGES AND SOLUTIONS, VOLS 1 AND 2, 2003, : 862 - 864
  • [5] Information security risk assessment model for risk management
    Wawrzyniak, Dariusz
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30
  • [6] Threat classification model for security information event management focusing on model efficiency
    Kim, Jae-yeol
    Kwon, Hyuk-Yoon
    [J]. COMPUTERS & SECURITY, 2022, 120
  • [7] Towards Collaborative Cyber Threat Intelligence for Security Management
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Dimitrakos, Theo
    [J]. ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 339 - 346
  • [8] Cyber Threat Intelligence in Risk Management A Survey of the Impact of Cyber Threat Intelligence on Saudi Higher Education Risk Management
    Aljuhami, Amira M.
    Bamasoud, Doaa M.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 156 - 164
  • [9] A situation awareness model for information security risk management
    Webb, Jeb
    Ahmad, Atif
    Maynard, Sean B.
    Shanks, Graeme
    [J]. COMPUTERS & SECURITY, 2014, 44 : 1 - 15
  • [10] Information Security Risk Management Model for Big Data
    Yang, Min
    [J]. ADVANCES IN MULTIMEDIA, 2022, 2022