Cyber Intelligence: A Framework for the Sharing of Data

被引:0
|
作者
Hewling, Moniphia [1 ]
机构
[1] Jamaica Cyber Incident Response Team, Kingston, Jamaica
关键词
cyber intelligence; cyber security; data collection and sharing; cyber defense; cyber threat intelligence; threat intelligence;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber Security threats manifest in a variety of formats ranging from espionage to the unaware insider. Intelligence or "intel" has been widely used traditionally in informing defense and security methodologies. These fields have evolved and so has the various methodologies of the craft. Cyber Intelligence too has evolved with time to become a critical aspect of support, influencing policy, strategy and tactical decisions. This paper will explore the need for a defined framework as well as associated standards and polices that will support existing information-sharing and analysis capabilities. It establishes a model for enabling the gathering and sharing of intelligence between government (incl: Military and Law enforcement) and the private sector in a trusted, constructive and actionable manner which is of critical importance. Cyber intelligence enables teams to be proactive and should be the core of all cyber security and defense planning and deliberations. It should drive all decision making activities. Cyber intelligence has been described as evidence-based information, including context, mechanisms, indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets (Shakeel 2017). This paper presents arguments which support the initiative that an ideal approach to cybersecurity requires sharing and cooperation between entities in order to identify-specific pending and existing threats. This will require that organisations share their own experiences with cyber threats as it is through collaborative efforts that the different intelligence sharing initiatives will be successful. The alleviation of issues is possible with the development of a standard framework flexible enough to accommodate the intricacies of all areas that have an impact on cyber intelligence. A potential framework will be presented incorporating views from practitioners in the field to include those in defense, security and mainstream government. This will in turn provide the basis from which a set of standards is defined to govern how the intelligence "data" is shared across agencies. This research is theoretical and will employ the qualitative methodology.
引用
收藏
页码:637 / 644
页数:8
相关论文
共 50 条
  • [1] Data Sanitisation and Redaction for Cyber Threat Intelligence Sharing Platforms
    Yucel, Cagatay
    Chalkias, Ioannis
    Mallis, Dimitrios
    Cetinkaya, Deniz
    Henriksen-Bulmer, Jane
    Cooper, Alice
    [J]. PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 343 - 347
  • [2] A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS
    Nguyen, Kathy
    Pal, Shantanu
    Jadidi, Zahra
    Dorri, Ali
    Jurdak, Raja
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2022,
  • [3] A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain
    Dunnett, Kealan
    Pal, Shantanu
    Putra, Guntur Dharma
    Jadidi, Zahra
    Jurdak, Raja
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1107 - 1114
  • [4] Sharing Cyber Threat Intelligence Under the General Data Protection Regulation
    Albakri, Adham
    Boiten, Eerke
    De Lemos, Rogerio
    [J]. PRIVACY TECHNOLOGIES AND POLICY, APF 2019, 2019, 11498 : 28 - 41
  • [5] Data-driven analytics for cyber-threat intelligence and information sharing
    Qamar, Sara
    Anwar, Zahid
    Rahman, Mohammad Ashiqur
    Al-Shaer, Ehab
    Chu, Bei-Tseng
    [J]. COMPUTERS & SECURITY, 2017, 67 : 35 - 58
  • [6] A Framework for Cyber Threat Intelligence Extraction from Raw Log Data
    Landauer, Max
    Skopik, Florian
    Wurzenberger, Markus
    Hotwagner, Wolfgang
    Rauber, Andreas
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 3200 - 3209
  • [7] From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms
    Sauerwein, Clemens
    Fischer, Daniel
    Rubsamen, Milena
    Rosenberger, Guido
    Stelzer, Dirk
    Breu, Ruth
    [J]. ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [8] The Role of Cyber Threat Intelligence Sharing in the Metaverse
    Dunnett, Kealan
    Pal, Shantanu
    Jadidi, Zahra
    Jurdak, Raja
    [J]. IEEE Internet of Things Magazine, 2023, 6 (01): : 154 - 160
  • [9] Risk Assessment of Sharing Cyber Threat Intelligence
    Albakri, Adham
    Boiten, Eerke
    Smith, Richard
    [J]. COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 92 - 113
  • [10] BLOCIS: Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance
    Gong, Seonghyeon
    Lee, Changhoon
    [J]. ELECTRONICS, 2020, 9 (03)