A success model for cyber threat intelligence management platforms
نویسندگان
چکیده
The increasingly persistent and sophisticated threat actors, along with the sheer speed at which cyber attacks unfold, have made timely decision making imperative for ensuring continued security of most organisations. Consequently, intelligence management platforms been widely adopted to assist organisations in creating participating inter-organisational sharing efforts protect against attacks. Measuring effectiveness success these is critical understanding how such products services should be designed, implemented used. Nevertheless, it a fact that research practice lack common factors influencing platforms. To investigate issues, we DeLone McLean information system model employed survey-based approach collect data from 152 professionals its empirical assessment. Subsequently, identified several are decisive organisational platform.
منابع مشابه
Cyber Threat Intelligence for Supporting the ATM Security Management
This paper presents the recent research advances in ATM (Air Traffic Management) industry showcasing the solution envisaged for the GAMMA Project and demonstrating how the cyber threat intelligence is used to support ATM security management.
متن کاملData-driven analytics for cyber-threat intelligence and information sharing
particular individual or entity. Although the speaker and content authors endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advice after a thorough examination of the particula...
متن کاملCyber-Threat Intelligence Architecture for Smart-Grid Critical Infrastructures Protection
Critical infrastructures (CIs) are becoming increasingly sophisticated with embedded cyber-physical systems (CPSs) that provide managerial automation and autonomic controls. Yet these advances expose CI components to new cyber-threats, leading to a chain of dysfunctionalities with catastrophic socio-economical implications. We propose a comprehensive architectural model to support the developme...
متن کاملIntelFlow: Towards adding Cyber Threat Intelligence to Software Defined Networks
Security is a major concern in computer networking, which faces increasing threats as the commercial Internet and related economies continue to grow. Our work aims to explore advances in Cyber Threat Intelligence (CTI) in the context of Software Defined Networking (SDN). More specifically, we propose IntelFlow, an intelligence detection system for Software Defined Networking (SDN) that follows ...
متن کاملThreat Visibility for Cyber Hunters
Multiple branches of the United States military, spearheaded by United States Cyber Command, have embraced threat hunting as a way to defend against more sophisticated adversaries. This white paper explains how Cyber Protection Teams (CPTs) can use wire data to automate detection, speed investigations, and improve the granularity and collection of information. The paper includes examples of thr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2021
ISSN: ['0167-4048', '1872-6208']
DOI: https://doi.org/10.1016/j.cose.2021.102466