Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI)

被引:0
|
作者
Aliyu, Aliyu [1 ]
He, Ying [1 ]
Yevseyeva, Iryna [1 ]
Luo, Cunjin [2 ,3 ]
机构
[1] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[2] Univ Essex, Sch Comp Sci & Elect Engn, Colchester, Essex, England
[3] Southwest Med Univ, Key Lab Med Electrophysiol, Luzhou, Peoples R China
关键词
cyber threat intelligence; risk assessment; decision making; boards;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As organisations around the world are embracing digitalisation to facilitate their business operations, their digital footprint is drawing the attention of adversaries and cyber activists. This is forcing the boards of organisations to engage actively in the cyber security decision making of the organisation. However, the boards themselves face the challenges of understanding the organisational threat landscape whilst also considering business continuity in terms of cyber security investment and decision trade-offs. This paper addresses these challenges by proposing a cyber security decision-making informed by cyber threat intelligence (CYDETI) framework. The CYDETI framework utilises cyber threat intelligence (CTI) and risk management taxonomies to inform decision making. The novel aspect of the framework is that it feeds CTI from the technical level to the operational level and ultimately to the strategic level. Furthermore, a planned scenario implementation and future studies are envisioned with leading industrial organisations.
引用
收藏
页数:2
相关论文
共 50 条
  • [1] Cyber-threat intelligence for security decision-making: A review and research agenda for practice
    Ainslie, Scott
    Thompson, Dean
    Maynard, Sean
    Ahmad, Atif
    COMPUTERS & SECURITY, 2023, 132
  • [2] Using Cyber Threat Intelligence in SDN Security
    Yurekten, Ozgur
    Demirci, Mehmet
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 377 - 382
  • [3] Cyber threat intelligence for critical infrastructure security
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Mori, Paolo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23):
  • [4] Cyber Security Threat Intelligence Monitoring and Classification
    Wang, Bo-Xiang
    Chen, Jiann-Liang
    Yu, Chiao-Lin
    2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2021, : 70 - 72
  • [5] Towards Collaborative Cyber Threat Intelligence for Security Management
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Dimitrakos, Theo
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 339 - 346
  • [6] A Summary of the Development of Cyber Security Threat Intelligence Sharing
    Du, Lili
    Fan, Yaqin
    Zhang, Lvyang
    Wang, Lianying
    Sun, Tianhang
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2020, 12 (04) : 54 - 67
  • [7] Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
    Gao, Peng
    Shao, Fei
    Liu, Xiaoyuan
    Xiao, Xusheng
    Qin, Zheng
    Xu, Fengyuan
    Mittal, Prateek
    Kulkarni, Sanjeev R.
    Song, Dawn
    2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 193 - 204
  • [8] Cyber threat attribution using unstructured reports in cyber threat intelligence
    Irshad, Ehtsham
    Siddiqui, Abdul Basit
    EGYPTIAN INFORMATICS JOURNAL, 2023, 24 (01) : 43 - 59
  • [9] Cyber Security Threat Intelligence Sharing Model Based on Blockchain
    Huang K.
    Lian Y.
    Feng D.
    Zhang H.
    Liu Y.
    Ma X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (04): : 836 - 846
  • [10] Offensive Security: Cyber Threat Intelligence Enrichment With Counterintelligence and Counterattack
    Rana, Muhammad Usman
    Ellahi, Osama
    Alam, Masoom
    Webber, Julian L.
    Mehbodniya, Abolfazl
    Khan, Shawal
    IEEE ACCESS, 2022, 10 : 108760 - 108774