An Enhanced Threat Intelligence Driven Hybrid Model for Information Security Risk Management

被引:0
|
作者
Amin, Habib E. L. [1 ,2 ,3 ]
Samhat, Abed Ellatif [1 ]
Chamoun, Maroun [2 ]
Oueidat, Lina [1 ]
Feghali, Antoine [3 ]
机构
[1] Lebanese Univ, Fac Engn, CRSI, Beirut, Lebanon
[2] St Joseph Univ Beirut, Ecole Super Ingenieurs Beyrouth, Beirut, Lebanon
[3] POTECH Labs, Riyadh, Saudi Arabia
关键词
Cyber Security; Information Security; Risk Management; Cyber Threat Intelligence; CYBERSECURITY;
D O I
10.1109/WoWMoM60985.2024.00013
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Risk management (RM) frameworks were established to identify, evaluate, and treat information security risks. The hybrid model for information security risk assessment (RA) [1] outlines a systematic process encompassing threat analysis while remaining agnostic to the source of threat information. It is limited in its adaptability to threat changes and dynamics. In an evolving landscape of changing threats, traditional RM methodologies face limitations in dynamic adaptation without considering Cyber Threat Intelligence (CTI) information. In this paper, we overview the established frameworks and methodologies for RM and CTI to identify gaps in the established RM frameworks. We propose a novel enhancement to the hybrid model by integrating CTI. This enhancement distinguishes our approach from other frameworks by facilitating the proactive inclusion of context-rich external threat data, leading to a more efficient RM process that effectively adapts to the ever-evolving cyber threat landscape.
引用
收藏
页码:5 / 12
页数:8
相关论文
共 50 条
  • [31] Information security management model
    Cribb, T
    Rao, A
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 654 - 657
  • [32] Method of Constructing a Visualization of Threat Model of Information Security
    Manzhosov, A., V
    Bolodurina, I. P.
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2020), 2020,
  • [33] Research of Information System Security Risk Management based on Probability Model and Security Entropy
    Du, Jiawei
    Zhou, Ying
    Guo, Ronghua
    Zhang, Xing
    Suo, Guowei
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE), 2017, 190 : 414 - 420
  • [34] An information security risk-driven investment model for analysing human factors
    Alavi, Reza
    Islam, Shareeful
    Mouratidis, Haralambos
    INFORMATION AND COMPUTER SECURITY, 2016, 24 (02) : 205 - 227
  • [35] Hybrid Intelligence Approaches for Distributed Information Management
    Ogiela, Urszula
    Takizawa, Makoto
    Ogiela, Lidia
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2022, 2022, 496 : 207 - 210
  • [36] A Test of Structured Threat Descriptions for Information Security Risk Assessments
    Karlzen, Henrik
    Bengtsson, Johan
    Hallberg, Jonas
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 469 - 476
  • [37] A success model for cyber threat intelligence management platforms
    Zibak, Adam
    Sauerwein, Clemens
    Simpson, Andrew
    COMPUTERS & SECURITY, 2021, 111
  • [38] Security through Information Risk Management
    Johnson, M. Eric
    Goetz, Eric
    Pfleeger, Shari Lawrence
    IEEE SECURITY & PRIVACY, 2009, 7 (03) : 45 - 52
  • [39] The Quantification Management of Information Security Risk
    Lao, Guoling
    Wang, Liping
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 10377 - 10380
  • [40] A Model to Assess the Maturity Level of the Risk Management Process in Information Security
    Mayer, Janice
    Fagundes, Leonardo Lemes
    2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT - WORKSHOPS, 2009, : 61 - 70