Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise

被引:0
|
作者
Hautamaki, Jari [1 ]
Kokkonen, Tero [1 ]
Sipola, Tuomo [1 ]
机构
[1] Jamk Univ Appl Sci, Inst Informat Technol, Jyvaskyla, Finland
来源
GOOD PRACTICES AND NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, WORLDCIST 2024 | 2024年 / 987卷
关键词
Cyber Security; Security Information Sharing; Situational Awareness; Threat Information Sharing; Indicator of Compromise; CONSTRUCTIVE RESEARCH; PERSPECTIVES;
D O I
10.1007/978-3-031-60221-4_5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the event of a cyber attack, the efficient production and utilisation of situational information is achieved by sharing information with other actors. In our research, we have discovered how information related to cyber security can be shared online as efficiently as possible between organisations. We used the constructive method to implement a cyber sercurity information sharing network using the Malware Information Sharing Project (MISP). The model was tested in a pilot exercise in fall 2021. The key findings in connection with the pilot showed that it is particularly important for the recipient of information security information how quickly and accurately the information security event is described. In order to help quick reaction, it would also be necessary to implement informal channels, through which security information can be shared easily without structured event descriptions.
引用
收藏
页码:45 / 55
页数:11
相关论文
共 50 条
  • [21] SECURE CYBER SECURITY THREAT INFORMATION EXCHANGE
    Ionita, Mihai-Gabriel
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY (IE 2015): EDUCATION, RESEARCH & BUSINESS TECHNOLOGIES, 2015, : 63 - 67
  • [22] Cyber Security Situational Awareness
    Tianfield, Huaglory
    2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 782 - 787
  • [23] What is 'Cyber Security'?: Differential Language of Cyber Security Across the Lifespan
    Jones, Simon L.
    Collins, Emily I. M.
    Levordashka, Ana
    Muir, Kate
    Joinson, Adam
    CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
  • [24] What kind of cyber security? Theorising cyber security and mapping approaches
    Fichtner, Laura
    INTERNET POLICY REVIEW, 2018, 7 (02):
  • [25] National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
    von Solms, Rossouw
    von Solms, Basie
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 369 - 374
  • [26] EU AND CYBER SECURITY
    Onescu, Dragos Ionut
    ELEARNING VISION 2020!, VOL I, 2016, : 436 - 441
  • [27] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [28] Cyber security and the Leviathan
    Da Silva, Joseph
    Computers and Security, 2022, 116
  • [29] Biometrics in Cyber Security
    Kour, Jaspreet
    Hanmandlu, M.
    Ansari, A. Q.
    DEFENCE SCIENCE JOURNAL, 2016, 66 (06) : 600 - 604
  • [30] CYBER SECURITY EXERCISE - LITERATURE REVIEW TO PEDAGOGICAL METHODOLOGY
    Hautamaki, Jari
    Karjalainen, Mika
    Hakkinen, Paivi
    Hamalainen, Timo
    13TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE (INTED2019), 2019, : 3893 - 3898