Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI)

被引:0
|
作者
Aliyu, Aliyu [1 ]
He, Ying [1 ]
Yevseyeva, Iryna [1 ]
Luo, Cunjin [2 ,3 ]
机构
[1] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[2] Univ Essex, Sch Comp Sci & Elect Engn, Colchester, Essex, England
[3] Southwest Med Univ, Key Lab Med Electrophysiol, Luzhou, Peoples R China
关键词
cyber threat intelligence; risk assessment; decision making; boards;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As organisations around the world are embracing digitalisation to facilitate their business operations, their digital footprint is drawing the attention of adversaries and cyber activists. This is forcing the boards of organisations to engage actively in the cyber security decision making of the organisation. However, the boards themselves face the challenges of understanding the organisational threat landscape whilst also considering business continuity in terms of cyber security investment and decision trade-offs. This paper addresses these challenges by proposing a cyber security decision-making informed by cyber threat intelligence (CYDETI) framework. The CYDETI framework utilises cyber threat intelligence (CTI) and risk management taxonomies to inform decision making. The novel aspect of the framework is that it feeds CTI from the technical level to the operational level and ultimately to the strategic level. Furthermore, a planned scenario implementation and future studies are envisioned with leading industrial organisations.
引用
收藏
页数:2
相关论文
共 50 条
  • [21] Cyber-security threat
    Klebba, Jesse
    CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [22] A normative decision-making model for cyber security
    M'manga, Andrew
    Faily, Shamal
    McAlaney, John
    Williams, Chris
    Kadobayashi, Youki
    Miyamoto, Daisuke
    INFORMATION AND COMPUTER SECURITY, 2019, 26 (05) : 636 - 646
  • [23] Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence
    Mavroeidis, Vasileios
    Bromander, Siri
    2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 91 - 98
  • [24] Cyber Security - Threat Scenarios, Policy Framework and Cyber Wargames
    Vaseashta, Ashok
    Susmann, Philip
    Braman, Eric
    CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK, 2014, 38 : 1 - 10
  • [25] Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence
    Dietz, Marietheres
    Schlette, Daniel
    Pernul, Gunther
    2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 789 - 797
  • [26] A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective
    Schlette, Daniel
    Caselli, Marco
    Pernul, Gunther
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (04): : 2525 - 2556
  • [27] Explainable artificial intelligence envisioned security mechanism for cyber threat hunting
    Kumar, Pankaj
    Wazid, Mohammad
    Singh, D. P.
    Singh, Jaskaran
    Das, Ashok Kumar
    Park, Youngho
    Rodrigues, Joel J. P. C.
    SECURITY AND PRIVACY, 2023, 6 (06)
  • [28] Computational intelligence in cyber security
    Dasgupta, Dipankar
    2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, 2006, : 2 - 3
  • [29] Cyber Threat Intelligence and Machine Learning
    Haass, Jon C.
    Proceedings - 2022 4th International Conference on Transdisciplinary AI, TransAI 2022, 2022, : 156 - 159
  • [30] Automated Generation of Cyber Threat Intelligence
    Kakumaru, Takahiro
    Takahashi, Wataru
    Katsuse, Riku
    Siracusano, Giuseppe
    Sanvito, Davide
    Bifulco, Roberto
    1600, NEC Mediaproducts (17): : 33 - 37