Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI)

被引:0
作者
Aliyu, Aliyu [1 ]
He, Ying [1 ]
Yevseyeva, Iryna [1 ]
Luo, Cunjin [2 ,3 ]
机构
[1] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[2] Univ Essex, Sch Comp Sci & Elect Engn, Colchester, Essex, England
[3] Southwest Med Univ, Key Lab Med Electrophysiol, Luzhou, Peoples R China
来源
2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2020年
关键词
cyber threat intelligence; risk assessment; decision making; boards;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As organisations around the world are embracing digitalisation to facilitate their business operations, their digital footprint is drawing the attention of adversaries and cyber activists. This is forcing the boards of organisations to engage actively in the cyber security decision making of the organisation. However, the boards themselves face the challenges of understanding the organisational threat landscape whilst also considering business continuity in terms of cyber security investment and decision trade-offs. This paper addresses these challenges by proposing a cyber security decision-making informed by cyber threat intelligence (CYDETI) framework. The CYDETI framework utilises cyber threat intelligence (CTI) and risk management taxonomies to inform decision making. The novel aspect of the framework is that it feeds CTI from the technical level to the operational level and ultimately to the strategic level. Furthermore, a planned scenario implementation and future studies are envisioned with leading industrial organisations.
引用
收藏
页数:2
相关论文
共 10 条
[1]   Strategic cyber intelligence [J].
Borum, Randy ;
Felker, John ;
Kern, Sean ;
Dennesen, Kristen ;
Feyes, Tonya .
INFORMATION AND COMPUTER SECURITY, 2015, 23 (03) :317-332
[2]  
Evans M., 2019, IEEE ACCESS, V7, P142147
[3]   Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form [J].
Evans, Mark ;
He, Ying ;
Luo, Cunjin ;
Yevseyeva, Iryna ;
Janicke, Helge ;
Maglaras, Leandros A. .
IEEE ACCESS, 2019, 7 :102087-102101
[4]  
EY, 2018, GLOB INF SEC SURV 20
[5]  
Gartner, 2019, 2020 PLANN GUID SEC
[6]  
He Y, 2015, IEEE CONF COMM NETW, P761, DOI 10.1109/CNS.2015.7346923
[7]  
Luo CJ, 2019, IEEE ENG MED BIO, P3454, DOI [10.1109/EMBC.2019.8857166, 10.1109/embc.2019.8857166]
[8]  
Pwc, 2018, GLOB STAT INF SEC SU
[9]   A survey on technical threat intelligence in the age of sophisticated cyber attacks [J].
Tounsi, Wiem ;
Rais, Helmi .
COMPUTERS & SECURITY, 2018, 72 :212-233
[10]  
Zibak A., 2019, P 14 INT C AV REL SE