Cyber Threat Intelligence in Risk Management A Survey of the Impact of Cyber Threat Intelligence on Saudi Higher Education Risk Management

被引:0
|
作者
Aljuhami, Amira M. [1 ]
Bamasoud, Doaa M. [1 ]
机构
[1] Univ Bisha, Coll Comp & Informat Technol, Dept IS, Bisha, Saudi Arabia
关键词
Cyber threat intelligence; risk management; cyberthreat; cyber security; FRAMEWORK;
D O I
10.14569/IJACSA.2021.0121018
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber Threat Information (CTI) has emerged to help cybersecurity professionals keep abreast of and respond to rising cyber threats (CT) in real-time. This paper aims to study the impact of cyber threat intelligence on risk management in Saudi universities in mitigating cyber risks. In this survey, a comprehensive review of CTI concepts and challenges, as well as risk management and practices in higher education, is presented. Previous literature was reviewed from theses, reviews, and books on the factors influencing the increase of cyber threats and CTI as well as risk management in higher education. A brief discussion of previous studies and their contribution to the current paper and the impact of CTI on risk management to reduce risk. An extensive search of more than 65 research papers was conducted and 28 were cited in this survey. Cyber threats are changing in addition to the huge flow of information about them and dealing with these threats on time requires advance and deep information about the nature of these threats and how to take appropriate defensive measures, and this is what defines the concept of CTI. The use of cyber threat information in risk management enhances the ability of defenders to mitigate growing cyber threats.
引用
收藏
页码:156 / 164
页数:9
相关论文
共 50 条
  • [21] A survey on technical threat intelligence in the age of sophisticated cyber attacks
    Tounsi, Wiem
    Rais, Helmi
    [J]. COMPUTERS & SECURITY, 2018, 72 : 212 - 233
  • [22] Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance
    Tosh, Deepak K.
    Shetty, Sachin
    Sengupta, Shamik
    Kesan, Jay P.
    Kamhoua, Charles A.
    [J]. GAME THEORY FOR NETWORKS (GAMENETS 2017), 2017, 212 : 154 - 164
  • [23] Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation
    Lin, Po-Ching
    Hsu, Wen-Hao
    Lin, Ying-Dar
    Hwang, Ren-Hung
    Wu, Hsiao-Kuang
    Lai, Yuan-Cheng
    Chen, Chung-Kuan
    [J]. COMPUTER NETWORKS, 2023, 228
  • [24] Quality Evaluation of Cyber Threat Intelligence Feeds
    Griffioen, Harm
    Booij, Tim
    Doerr, Christian
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 277 - 296
  • [25] SmartSentry: Cyber Threat Intelligence in Industrial IoT
    Sadhwani, Sapna
    Modi, Urvi Kavan
    Muthalagu, Raja
    Pawar, Pranav M.
    [J]. IEEE ACCESS, 2024, 12 : 34720 - 34740
  • [26] Using Cyber Threat Intelligence in SDN Security
    Yurekten, Ozgur
    Demirci, Mehmet
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 377 - 382
  • [27] The Role of Cyber Threat Intelligence Sharing in the Metaverse
    Queensland University of Technology, Australia
    不详
    不详
    [J]. IEEE Inter. Things Magazine, 2023, 1 (154-160): : 154 - 160
  • [28] Cyber Security Threat Intelligence Monitoring and Classification
    Wang, Bo-Xiang
    Chen, Jiann-Liang
    Yu, Chiao-Lin
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2021, : 70 - 72
  • [29] Tactics And Techniques Classification In Cyber Threat Intelligence
    Yu, Zhongkun
    Wang, JunFeng
    Tang, BinHui
    Lu, Li
    [J]. COMPUTER JOURNAL, 2023, 66 (08): : 1870 - 1881
  • [30] Measuring and visualizing cyber threat intelligence quality
    Daniel Schlette
    Fabian Böhm
    Marco Caselli
    Günther Pernul
    [J]. International Journal of Information Security, 2021, 20 : 21 - 38