Cyber Threat Intelligence in Risk Management A Survey of the Impact of Cyber Threat Intelligence on Saudi Higher Education Risk Management

被引:0
|
作者
Aljuhami, Amira M. [1 ]
Bamasoud, Doaa M. [1 ]
机构
[1] Univ Bisha, Coll Comp & Informat Technol, Dept IS, Bisha, Saudi Arabia
关键词
Cyber threat intelligence; risk management; cyberthreat; cyber security; FRAMEWORK;
D O I
10.14569/IJACSA.2021.0121018
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber Threat Information (CTI) has emerged to help cybersecurity professionals keep abreast of and respond to rising cyber threats (CT) in real-time. This paper aims to study the impact of cyber threat intelligence on risk management in Saudi universities in mitigating cyber risks. In this survey, a comprehensive review of CTI concepts and challenges, as well as risk management and practices in higher education, is presented. Previous literature was reviewed from theses, reviews, and books on the factors influencing the increase of cyber threats and CTI as well as risk management in higher education. A brief discussion of previous studies and their contribution to the current paper and the impact of CTI on risk management to reduce risk. An extensive search of more than 65 research papers was conducted and 28 were cited in this survey. Cyber threats are changing in addition to the huge flow of information about them and dealing with these threats on time requires advance and deep information about the nature of these threats and how to take appropriate defensive measures, and this is what defines the concept of CTI. The use of cyber threat information in risk management enhances the ability of defenders to mitigate growing cyber threats.
引用
收藏
页码:156 / 164
页数:9
相关论文
共 50 条
  • [1] Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure
    Kure, Halima Ibrahim
    Islam, Shareeful
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (11) : 1478 - 1502
  • [2] Risk Assessment of Sharing Cyber Threat Intelligence
    Albakri, Adham
    Boiten, Eerke
    Smith, Richard
    [J]. COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 92 - 113
  • [3] A success model for cyber threat intelligence management platforms
    Zibak, Adam
    Sauerwein, Clemens
    Simpson, Andrew
    [J]. COMPUTERS & SECURITY, 2021, 111
  • [4] Towards Collaborative Cyber Threat Intelligence for Security Management
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Dimitrakos, Theo
    [J]. ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 339 - 346
  • [5] Leveraging cyber threat intelligence for a dynamic risk framework
    Riesco, R.
    Villagra, V. A.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (06) : 715 - 739
  • [6] Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence
    Merah, Yazid
    Kenaza, Tayeb
    [J]. ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [7] Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
    Gao, Peng
    Shao, Fei
    Liu, Xiaoyuan
    Xiao, Xusheng
    Qin, Zheng
    Xu, Fengyuan
    Mittal, Prateek
    Kulkarni, Sanjeev R.
    Song, Dawn
    [J]. 2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 193 - 204
  • [8] The third international workshop on cyber threat intelligence management (CyberTIM)
    Vasilomanolakis, Emmanouil
    Happa, Jassim
    Habib, Sheikh Mahbub
    [J]. ACM International Conference Proceeding Series, 2020,
  • [9] Modeling Cyber Threat Intelligence
    Bromander, Siri
    Swimmer, Morton
    Eian, Martin
    Skjotskift, Geir
    Borg, Fredrik
    [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 273 - 280
  • [10] Unifying Cyber Threat Intelligence
    Menges, Florian
    Sperl, Christine
    Pernul, Guenther
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2019, 2019, 11711 : 161 - 175