Cyber Threat Intelligence in Risk Management A Survey of the Impact of Cyber Threat Intelligence on Saudi Higher Education Risk Management

被引:0
|
作者
Aljuhami, Amira M. [1 ]
Bamasoud, Doaa M. [1 ]
机构
[1] Univ Bisha, Coll Comp & Informat Technol, Dept IS, Bisha, Saudi Arabia
关键词
Cyber threat intelligence; risk management; cyberthreat; cyber security; FRAMEWORK;
D O I
10.14569/IJACSA.2021.0121018
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber Threat Information (CTI) has emerged to help cybersecurity professionals keep abreast of and respond to rising cyber threats (CT) in real-time. This paper aims to study the impact of cyber threat intelligence on risk management in Saudi universities in mitigating cyber risks. In this survey, a comprehensive review of CTI concepts and challenges, as well as risk management and practices in higher education, is presented. Previous literature was reviewed from theses, reviews, and books on the factors influencing the increase of cyber threats and CTI as well as risk management in higher education. A brief discussion of previous studies and their contribution to the current paper and the impact of CTI on risk management to reduce risk. An extensive search of more than 65 research papers was conducted and 28 were cited in this survey. Cyber threats are changing in addition to the huge flow of information about them and dealing with these threats on time requires advance and deep information about the nature of these threats and how to take appropriate defensive measures, and this is what defines the concept of CTI. The use of cyber threat information in risk management enhances the ability of defenders to mitigate growing cyber threats.
引用
收藏
页码:156 / 164
页数:9
相关论文
共 50 条
  • [41] Cyber threat intelligence challenges: Leveraging blockchain intelligence with possible solution
    Saxena, Rashi
    Gayathri, E.
    [J]. MATERIALS TODAY-PROCEEDINGS, 2022, 51 : 682 - 689
  • [42] Sharing Susceptible Passwords as Cyber Threat Intelligence Feed
    Vakilinia, Iman
    Cheung, Sui
    Sengupta, Shamik
    [J]. 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 767 - 772
  • [43] Multi Platform Honeypot for Generation of Cyber Threat Intelligence
    Kumar, Sanjeev
    Janet, B.
    Eswari, R.
    [J]. PROCEEDINGS OF THE 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC 2019), 2019, : 25 - 29
  • [44] A Summary of the Development of Cyber Security Threat Intelligence Sharing
    Du, Lili
    Fan, Yaqin
    Zhang, Lvyang
    Wang, Lianying
    Sun, Tianhang
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2020, 12 (04) : 54 - 67
  • [45] Actionable Cyber Threat Intelligence for Automated Incident Response
    Leite, Cristoffer
    den Hartog, Jerry
    dos Santos, Daniel Ricardo
    Costante, Elisa
    [J]. SECURE IT SYSTEMS, NORDSEC 2022, 2022, 13700 : 368 - 385
  • [46] Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs
    Gylling, Andreas
    Ekstedt, Mathias
    Afzal, Zeeshan
    Eliasson, Per
    [J]. PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 304 - 311
  • [47] Cyber Threat Intelligence for IoT Using Machine Learning
    Mishra, Shailendra
    Albarakati, Aiman
    Sharma, Sunil Kumar
    [J]. PROCESSES, 2022, 10 (12)
  • [48] Cyber Threat Intelligence on Blockchain: A Systematic Literature Review
    Chatziamanetoglou, Dimitrios
    Rantos, Konstantinos
    [J]. COMPUTERS, 2024, 13 (03)
  • [49] From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms
    Sauerwein, Clemens
    Fischer, Daniel
    Rubsamen, Milena
    Rosenberger, Guido
    Stelzer, Dirk
    Breu, Ruth
    [J]. ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [50] A Reference Model for Cyber Threat Intelligence (CTI) Systems
    Sakellariou, Georgios
    Fouliras, Panagiotis
    Mavridis, Ioannis
    Sarigiannidis, Panagiotis
    [J]. ELECTRONICS, 2022, 11 (09)