Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise

被引:0
|
作者
Hautamaki, Jari [1 ]
Kokkonen, Tero [1 ]
Sipola, Tuomo [1 ]
机构
[1] Jamk Univ Appl Sci, Inst Informat Technol, Jyvaskyla, Finland
关键词
Cyber Security; Security Information Sharing; Situational Awareness; Threat Information Sharing; Indicator of Compromise; CONSTRUCTIVE RESEARCH; PERSPECTIVES;
D O I
10.1007/978-3-031-60221-4_5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the event of a cyber attack, the efficient production and utilisation of situational information is achieved by sharing information with other actors. In our research, we have discovered how information related to cyber security can be shared online as efficiently as possible between organisations. We used the constructive method to implement a cyber sercurity information sharing network using the Malware Information Sharing Project (MISP). The model was tested in a pilot exercise in fall 2021. The key findings in connection with the pilot showed that it is particularly important for the recipient of information security information how quickly and accurately the information security event is described. In order to help quick reaction, it would also be necessary to implement informal channels, through which security information can be shared easily without structured event descriptions.
引用
收藏
页码:45 / 55
页数:11
相关论文
共 50 条
  • [31] Cyber Security Training A Survey of Serious Games in Cyber Security
    Tioh, Jin-Ning
    Mina, Mani
    Jacobson, Douglas W.
    2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,
  • [32] Designing a Formal Model Facilitating Collaborative Information Sharing for Community Cyber Security
    Zhao, Wanying
    White, Gregory
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 1987 - 1996
  • [33] RT-Based Administrative Models for Community Cyber Security Information Sharing
    Sandhu, Ravi
    Bijon, Khalid Zaman
    Jin, Xin
    Krishnan, Ram
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2011, : 473 - 478
  • [34] Cyber Mission Assurance for Cyber Security
    MacKay M.
    ITNOW, 2020, 62 (01) : 32 - 33
  • [35] Cyber Security without Cyber War
    O'Connell, Mary Ellen
    JOURNAL OF CONFLICT & SECURITY LAW, 2012, 17 (02): : 187 - 209
  • [36] A Summary of the Development of Cyber Security Threat Intelligence Sharing
    Du, Lili
    Fan, Yaqin
    Zhang, Lvyang
    Wang, Lianying
    Sun, Tianhang
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2020, 12 (04) : 54 - 67
  • [37] Innovative Protocols for Data Sharing and Cyber Systems Security
    Ogiela, Urszula
    Takizawa, Makoto
    Ogiela, Lidia
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2018, 2019, 22 : 445 - 452
  • [38] Preparing for Cyber Threats with Information Security Policies
    Ilvonen, Ilona
    Virtanen, Pasi
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (04) : 22 - 31
  • [39] Moving beyond cyber security awareness and training to engendering security knowledge sharing
    Alahmari, Saad
    Renaud, Karen
    Omoronyia, Inah
    INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2023, 21 (01) : 123 - 158
  • [40] SECURE CYBER SECURITY THREAT INFORMATION EXCHANGE
    Ionita, Mihai-Gabriel
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY (IE 2015): EDUCATION, RESEARCH & BUSINESS TECHNOLOGIES, 2015, : 63 - 67