An Enhanced Threat Intelligence Driven Hybrid Model for Information Security Risk Management

被引:0
|
作者
Amin, Habib E. L. [1 ,2 ,3 ]
Samhat, Abed Ellatif [1 ]
Chamoun, Maroun [2 ]
Oueidat, Lina [1 ]
Feghali, Antoine [3 ]
机构
[1] Lebanese Univ, Fac Engn, CRSI, Beirut, Lebanon
[2] St Joseph Univ Beirut, Ecole Super Ingenieurs Beyrouth, Beirut, Lebanon
[3] POTECH Labs, Riyadh, Saudi Arabia
关键词
Cyber Security; Information Security; Risk Management; Cyber Threat Intelligence; CYBERSECURITY;
D O I
10.1109/WoWMoM60985.2024.00013
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Risk management (RM) frameworks were established to identify, evaluate, and treat information security risks. The hybrid model for information security risk assessment (RA) [1] outlines a systematic process encompassing threat analysis while remaining agnostic to the source of threat information. It is limited in its adaptability to threat changes and dynamics. In an evolving landscape of changing threats, traditional RM methodologies face limitations in dynamic adaptation without considering Cyber Threat Intelligence (CTI) information. In this paper, we overview the established frameworks and methodologies for RM and CTI to identify gaps in the established RM frameworks. We propose a novel enhancement to the hybrid model by integrating CTI. This enhancement distinguishes our approach from other frameworks by facilitating the proactive inclusion of context-rich external threat data, leading to a more efficient RM process that effectively adapts to the ever-evolving cyber threat landscape.
引用
收藏
页码:5 / 12
页数:8
相关论文
共 50 条
  • [41] An Ontology-Based Security Risk Management Model for Information Systems
    Oluwasefunmi T. Arogundade
    Adebayo Abayomi-Alli
    Sanjay Misra
    [J]. Arabian Journal for Science and Engineering, 2020, 45 : 6183 - 6198
  • [42] Artificial Intelligence Techniques for Information Security Risk Assessment
    Basallo, Y. A.
    Senti, V. E.
    Sanchez, N. M.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2018, 16 (03) : 897 - 901
  • [43] Big Data Management System Security Threat Model
    Poltavtseva, M. A.
    Zegzhda, D. P.
    Kalinin, M. O.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 903 - 913
  • [44] Big Data Management System Security Threat Model
    M. A. Poltavtseva
    D. P. Zegzhda
    M. O. Kalinin
    [J]. Automatic Control and Computer Sciences, 2019, 53 : 903 - 913
  • [45] Data-driven analytics for cyber-threat intelligence and information sharing
    Qamar, Sara
    Anwar, Zahid
    Rahman, Mohammad Ashiqur
    Al-Shaer, Ehab
    Chu, Bei-Tseng
    [J]. COMPUTERS & SECURITY, 2017, 67 : 35 - 58
  • [46] The Application of Big Data and Artificial Intelligence Technology in Enterprise Information Security Management and Risk Assessment
    Wang, Qi
    Zong, Bangfeng
    Lin, Yong
    Li, Zhuangzhuang
    Luo, Xv
    [J]. JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2023, 35 (01)
  • [47] Information security management: An information security retrieval and awareness model for industry
    Kritzinger, E.
    Smith, E.
    [J]. COMPUTERS & SECURITY, 2008, 27 (5-6) : 224 - 231
  • [48] Risk-driven security testing using risk analysis with threat modeling approach
    Palanivel, Maragathavalli
    Selvadurai, Kanmani
    [J]. SPRINGERPLUS, 2014, 3 : 1 - 14
  • [49] Enterprise Risk Management and Information Systems Security Risk
    Olson, David L.
    Wu, Desheng
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON RISK MANAGEMENT & GLOBAL E-BUSINESS, VOLS I AND II, 2009, : 1 - 5
  • [50] A Threat Model-Driven Security Testing Approach for Web Application
    Yan, Bobo
    Li, Xiaohong
    Du, Zhijie
    [J]. CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 158 - 168