Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise

被引:0
|
作者
Hautamaki, Jari [1 ]
Kokkonen, Tero [1 ]
Sipola, Tuomo [1 ]
机构
[1] Jamk Univ Appl Sci, Inst Informat Technol, Jyvaskyla, Finland
来源
GOOD PRACTICES AND NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, WORLDCIST 2024 | 2024年 / 987卷
关键词
Cyber Security; Security Information Sharing; Situational Awareness; Threat Information Sharing; Indicator of Compromise; CONSTRUCTIVE RESEARCH; PERSPECTIVES;
D O I
10.1007/978-3-031-60221-4_5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the event of a cyber attack, the efficient production and utilisation of situational information is achieved by sharing information with other actors. In our research, we have discovered how information related to cyber security can be shared online as efficiently as possible between organisations. We used the constructive method to implement a cyber sercurity information sharing network using the Malware Information Sharing Project (MISP). The model was tested in a pilot exercise in fall 2021. The key findings in connection with the pilot showed that it is particularly important for the recipient of information security information how quickly and accurately the information security event is described. In order to help quick reaction, it would also be necessary to implement informal channels, through which security information can be shared easily without structured event descriptions.
引用
收藏
页码:45 / 55
页数:11
相关论文
共 50 条
  • [31] NATO AND CYBER SECURITY
    Kazakovtsev, A. V.
    VOLGOGRADSKII GOSUDARSTVENNYI UNIVERSITET-VESTNIK-SERIYA 4-ISTORIYA REGIONOVEDENIE MEZHDUNARODNYE OTNOSHENIYA, 2012, 17 (02): : 109 - 114
  • [32] Cyber Security Defence Policies: A Proposed Guidelines for Organisations Cyber Security Practices
    Oyelami, Julius Olusegun
    Kassim, Azleena Mohd
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (08) : 131 - 138
  • [33] Governing Cyber Security through Networks: An Analysis of Cyber Security Coordination in Belgium
    Rondelez, Rafael
    INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2018, 12 (01): : 300 - 315
  • [34] Fighting Botnets with Cyber-Security Analytics Dealing with heterogeneous cyber-security information in new generation SIEMs
    Gallego-Nicasio Crespo, Beatriz
    Garwood, Alan
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 192 - 198
  • [35] Analysis of cyber security knowledge gaps based on cyber security body of knowledge
    Catal, Cagatay
    Ozcan, Alper
    Donmez, Emrah
    Kasif, Ahmet
    EDUCATION AND INFORMATION TECHNOLOGIES, 2023, 28 (02) : 1809 - 1831
  • [36] Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality Management
    Sharbaf, Mehrdad S.
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 332 - 337
  • [37] Cyber Security Threat Intelligence Sharing Model Based on Blockchain
    Huang K.
    Lian Y.
    Feng D.
    Zhang H.
    Liu Y.
    Ma X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (04): : 836 - 846
  • [38] Information Visualization Metrics and Methods for Cyber Security Evaluation
    Langton, John T.
    Baker, Alex
    2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 292 - 294
  • [39] CYBER (IN)SECURITY OF PERSONAL DATA AND INFORMATION IN TIMES OF DIGITIZATION
    Dvojmoc, Miha
    Verboten, Mojca Tancer
    MEDICINE LAW & SOCIETY, 2022, 15 (02): : 287 - 304
  • [40] Leveraging Information Security Continuous Monitoring for Cyber Defense
    AlSadhan, Tina
    Park, Joon
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 401 - 408