Cyber Threat Intelligence in Risk Management A Survey of the Impact of Cyber Threat Intelligence on Saudi Higher Education Risk Management

被引:0
|
作者
Aljuhami, Amira M. [1 ]
Bamasoud, Doaa M. [1 ]
机构
[1] Univ Bisha, Coll Comp & Informat Technol, Dept IS, Bisha, Saudi Arabia
关键词
Cyber threat intelligence; risk management; cyberthreat; cyber security; FRAMEWORK;
D O I
10.14569/IJACSA.2021.0121018
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber Threat Information (CTI) has emerged to help cybersecurity professionals keep abreast of and respond to rising cyber threats (CT) in real-time. This paper aims to study the impact of cyber threat intelligence on risk management in Saudi universities in mitigating cyber risks. In this survey, a comprehensive review of CTI concepts and challenges, as well as risk management and practices in higher education, is presented. Previous literature was reviewed from theses, reviews, and books on the factors influencing the increase of cyber threats and CTI as well as risk management in higher education. A brief discussion of previous studies and their contribution to the current paper and the impact of CTI on risk management to reduce risk. An extensive search of more than 65 research papers was conducted and 28 were cited in this survey. Cyber threats are changing in addition to the huge flow of information about them and dealing with these threats on time requires advance and deep information about the nature of these threats and how to take appropriate defensive measures, and this is what defines the concept of CTI. The use of cyber threat information in risk management enhances the ability of defenders to mitigate growing cyber threats.
引用
收藏
页码:156 / 164
页数:9
相关论文
共 50 条
  • [21] Automated Generation of Cyber Threat Intelligence
    Kakumaru, Takahiro
    Takahashi, Wataru
    Katsuse, Riku
    Siracusano, Giuseppe
    Sanvito, Davide
    Bifulco, Roberto
    1600, NEC Mediaproducts (17): : 33 - 37
  • [22] Cyber threat challenges intelligence capability
    Aviation Week and Space Technology (New York), 1997, 146 (06):
  • [23] Cyber threat challenges intelligence capability
    Covault, C
    AVIATION WEEK & SPACE TECHNOLOGY, 1997, 146 (06): : 20 - 21
  • [24] A survey on technical threat intelligence in the age of sophisticated cyber attacks
    Tounsi, Wiem
    Rais, Helmi
    COMPUTERS & SECURITY, 2018, 72 : 212 - 233
  • [25] Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance
    Tosh, Deepak K.
    Shetty, Sachin
    Sengupta, Shamik
    Kesan, Jay P.
    Kamhoua, Charles A.
    GAME THEORY FOR NETWORKS (GAMENETS 2017), 2017, 212 : 154 - 164
  • [26] A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture
    Thilakarathne, Navod Neranjan
    Bakar, Muhammad Saifullah Abu
    Abas, Pg Emeroylariffion
    Yassin, Hayati
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [27] Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation
    Lin, Po-Ching
    Hsu, Wen-Hao
    Lin, Ying-Dar
    Hwang, Ren-Hung
    Wu, Hsiao-Kuang
    Lai, Yuan-Cheng
    Chen, Chung-Kuan
    COMPUTER NETWORKS, 2023, 228
  • [28] Cyber Threat Intelligence meets the Analytic Tradecraft
    Bjurling, Bjoern
    Raza, Shahid
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2025, 28 (01)
  • [29] Quality Evaluation of Cyber Threat Intelligence Feeds
    Griffioen, Harm
    Booij, Tim
    Doerr, Christian
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 277 - 296
  • [30] Cyber Threat Analysis and Trustworthy Artificial Intelligence
    Wang, Shuangbao Paul
    Arafin, Md Tanvir
    Osuagwu, Onyema
    Wandji, Ketchiozo
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 86 - 90