Cyber Threat Intelligence in Risk Management A Survey of the Impact of Cyber Threat Intelligence on Saudi Higher Education Risk Management

被引:0
|
作者
Aljuhami, Amira M. [1 ]
Bamasoud, Doaa M. [1 ]
机构
[1] Univ Bisha, Coll Comp & Informat Technol, Dept IS, Bisha, Saudi Arabia
关键词
Cyber threat intelligence; risk management; cyberthreat; cyber security; FRAMEWORK;
D O I
10.14569/IJACSA.2021.0121018
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber Threat Information (CTI) has emerged to help cybersecurity professionals keep abreast of and respond to rising cyber threats (CT) in real-time. This paper aims to study the impact of cyber threat intelligence on risk management in Saudi universities in mitigating cyber risks. In this survey, a comprehensive review of CTI concepts and challenges, as well as risk management and practices in higher education, is presented. Previous literature was reviewed from theses, reviews, and books on the factors influencing the increase of cyber threats and CTI as well as risk management in higher education. A brief discussion of previous studies and their contribution to the current paper and the impact of CTI on risk management to reduce risk. An extensive search of more than 65 research papers was conducted and 28 were cited in this survey. Cyber threats are changing in addition to the huge flow of information about them and dealing with these threats on time requires advance and deep information about the nature of these threats and how to take appropriate defensive measures, and this is what defines the concept of CTI. The use of cyber threat information in risk management enhances the ability of defenders to mitigate growing cyber threats.
引用
下载
收藏
页码:156 / 164
页数:9
相关论文
共 50 条
  • [21] Cyber threat challenges intelligence capability
    Covault, C
    AVIATION WEEK & SPACE TECHNOLOGY, 1997, 146 (06): : 20 - 21
  • [22] A survey on technical threat intelligence in the age of sophisticated cyber attacks
    Tounsi, Wiem
    Rais, Helmi
    COMPUTERS & SECURITY, 2018, 72 : 212 - 233
  • [23] Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance
    Tosh, Deepak K.
    Shetty, Sachin
    Sengupta, Shamik
    Kesan, Jay P.
    Kamhoua, Charles A.
    GAME THEORY FOR NETWORKS (GAMENETS 2017), 2017, 212 : 154 - 164
  • [24] A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture
    Navod Neranjan Thilakarathne
    Muhammad Saifullah Abu Bakar
    Pg Emeroylariffion Abas
    Hayati Yassin
    Scientific Reports, 15 (1)
  • [25] Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation
    Lin, Po-Ching
    Hsu, Wen-Hao
    Lin, Ying-Dar
    Hwang, Ren-Hung
    Wu, Hsiao-Kuang
    Lai, Yuan-Cheng
    Chen, Chung-Kuan
    COMPUTER NETWORKS, 2023, 228
  • [26] Human–AI Enhancement of Cyber Threat Intelligence
    Daniel Cohen
    Dov Te’eni
    Inbal Yahav
    Alexey Zagalsky
    David Schwartz
    Gahl Silverman
    Yossi Mann
    Amir Elalouf
    Jeremy Makowski
    International Journal of Information Security, 2025, 24 (2)
  • [27] Cyber Threat Intelligence meets the Analytic Tradecraft
    Bjurling, Björn
    Raza, Shahid
    ACM Transactions on Privacy and Security, 2024, 28 (01)
  • [28] Quality Evaluation of Cyber Threat Intelligence Feeds
    Griffioen, Harm
    Booij, Tim
    Doerr, Christian
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 277 - 296
  • [29] Cyber Security Threat Intelligence Monitoring and Classification
    Wang, Bo-Xiang
    Chen, Jiann-Liang
    Yu, Chiao-Lin
    2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2021, : 70 - 72
  • [30] SmartSentry: Cyber Threat Intelligence in Industrial IoT
    Sadhwani, Sapna
    Modi, Urvi Kavan
    Muthalagu, Raja
    Pawar, Pranav M.
    IEEE ACCESS, 2024, 12 : 34720 - 34740