Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise

被引:0
|
作者
Hautamaki, Jari [1 ]
Kokkonen, Tero [1 ]
Sipola, Tuomo [1 ]
机构
[1] Jamk Univ Appl Sci, Inst Informat Technol, Jyvaskyla, Finland
关键词
Cyber Security; Security Information Sharing; Situational Awareness; Threat Information Sharing; Indicator of Compromise; CONSTRUCTIVE RESEARCH; PERSPECTIVES;
D O I
10.1007/978-3-031-60221-4_5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the event of a cyber attack, the efficient production and utilisation of situational information is achieved by sharing information with other actors. In our research, we have discovered how information related to cyber security can be shared online as efficiently as possible between organisations. We used the constructive method to implement a cyber sercurity information sharing network using the Malware Information Sharing Project (MISP). The model was tested in a pilot exercise in fall 2021. The key findings in connection with the pilot showed that it is particularly important for the recipient of information security information how quickly and accurately the information security event is described. In order to help quick reaction, it would also be necessary to implement informal channels, through which security information can be shared easily without structured event descriptions.
引用
收藏
页码:45 / 55
页数:11
相关论文
共 50 条
  • [21] Cyber security
    Sandström, E
    Weiss, J
    2005 CIGRE/IEEE PES International Symposium, 2005, : 282 - 289
  • [22] CYBER SECURITY
    Sonntag, Michael
    IDIMT-2016- INFORMATION TECHNOLOGY, SOCIETY AND ECONOMY STRATEGIC CROSS-INFLUENCES, 2016, 45 : 313 - 323
  • [23] Cyber(in)security
    Szczypiorski, Krzysztof
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2020, 66 (01) : 243 - 248
  • [24] Cyber Security
    Welander, Peter
    CONTROL ENGINEERING, 2009, 56 (01) : 40 - 43
  • [25] Cyber security
    Colias, M
    HOSPITALS & HEALTH NETWORKS, 2004, 78 (05): : 60 - +
  • [26] INFORMATION SECURITY MANAGEMENT SYSTEM AND CYBER SECURITY IN THE CZECH REPUBLIC
    Drastich, Martin
    ZNALOSTI PRO TRZNI PRAXI 2015: ZENY - PODNIKATELKY V MINULOSTI A SOUCASNOSTI, 2015, : 85 - 90
  • [27] From Information Security to Cyber Security Cultures Organizations to Societies
    Reid, Rayne
    Van Niekerk, Lohan
    2014 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2014,
  • [28] Virtual Cyber-Security Testing Capability for large scale distributed information infrastructure protection
    Pederson, Perry
    Lee, David
    Shu, Guoqiang
    Chen, Dongluo
    Liu, Zhijun
    Li, Na
    Sang, Lifeng
    2008 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, VOLS 1 AND 2, 2008, : 372 - +
  • [29] Taxonomy of cyber security metrics to measure strength of cyber security
    Gupta Bhol S.
    Mohanty J.R.
    Kumar Pattnaik P.
    Materials Today: Proceedings, 2023, 80 : 2274 - 2279
  • [30] The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
    Lehto, Martti
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 1 - 18