Cyber-threat intelligence for security decision-making: A review and research agenda for practice

被引:25
作者
Ainslie, Scott [1 ]
Thompson, Dean [2 ]
Maynard, Sean [1 ]
Ahmad, Atif [1 ]
机构
[1] Univ Melbourne, Sch Comp & Informat Syst, Parkville, Vic, Australia
[2] ANZ Banking Grp, Docklands, Vic, Australia
基金
澳大利亚研究理事会;
关键词
Cyber threat intelligence; Organizational practice; Research agenda; Intelligence process; Stakeholder management; THINKING; MODEL;
D O I
10.1016/j.cose.2023.103352
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing militarization of the cyber-threat environment has driven considerable interest in under-standing the role of cyber-threat intelligence (CTI) in supporting the enterprise. Despite CTI's value propo-sition to organizations, the rate of industry adoption has been low and localized within IT Operations. Our review of the research and practice literature on CTI shows that the discourse is heavily dominated by the technology perspective, leaving significant gaps in the knowledge of CTI. We begin with a background study that reinforces the traditional origins of CTI as a process derived from the Intelligence Cycle that is referenced and practiced in military intelligence studies. We describe the Intelligence Cycle and its phases and reinforce the characteristics and attributes of intelligence, asserting the critical importance of synthesizing information into intelligence. We subsequently develop a research agenda for practice researchers addressing the critical research question: "How can cyber-threat intelligence be operationalized in organizations?" We begin by explor-ing research questions to develop the theoretical foundations of CTI. Towards this objective, we present a useful template for process theory that generates practice outcomes. We then discuss methods suited to practice research in CTI before moving on to inquiries concerning the role and purpose of CTI in practice. We delve into questions on the broad aspects of practice at both the macro-level, focusing on the ex-amination of CTI programs in organizations with different strategic risks, and the micro-level, exploring the distinctions between practice, praxis, and practitioners. Additionally, we explore questions on the role of artifacts, objects, and information systems that support CTI practice, including spaces and the role of practitioners and non-practitioners. After exploring various practice-related topics, we examine potential research opportunities pertaining to the prevailing narratives surrounding technology and information sharing, as identified in our literature review. & COPY; 2023 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )
引用
收藏
页数:16
相关论文
共 83 条
[1]  
Abu M.S., 2018, 2 GLOBAL C COMPUTING
[2]   How can organizations develop situation awareness for incident response: A case study of management practice [J].
Ahmad, Atif ;
Maynard, Sean B. ;
Desouza, Kevin C. ;
Kotsias, James ;
Whitty, Monica T. ;
Baskerville, Richard L. .
COMPUTERS & SECURITY, 2021, 101
[3]   How integration of cyber security management and incident response enables organizational learning [J].
Ahmad, Atif ;
Desouza, Kevin C. ;
Maynard, Sean B. ;
Naseer, Humza ;
Baskerville, Richard L. .
JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY, 2020, 71 (08) :939-953
[4]   Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack [J].
Ahmad, Atif ;
Webb, Jeb ;
Desouza, Kevin C. ;
Boorman, James .
COMPUTERS & SECURITY, 2019, 86 :402-418
[5]  
Army Australian, 2018, LWD 2 0 INT
[6]  
Army U.S., 2019, ADP 2 0 INT
[7]  
Army U.S., 2010, FM 2 0 INT
[8]  
Barnum Sean, 2012, Mitre Corp., V11, P1
[9]  
Baskerville R., 2020, EUR J INFORM SYST
[10]  
Bauer S., 2020, EVALUATION FRAMEWORK