Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise

被引:0
|
作者
Hautamaki, Jari [1 ]
Kokkonen, Tero [1 ]
Sipola, Tuomo [1 ]
机构
[1] Jamk Univ Appl Sci, Inst Informat Technol, Jyvaskyla, Finland
关键词
Cyber Security; Security Information Sharing; Situational Awareness; Threat Information Sharing; Indicator of Compromise; CONSTRUCTIVE RESEARCH; PERSPECTIVES;
D O I
10.1007/978-3-031-60221-4_5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the event of a cyber attack, the efficient production and utilisation of situational information is achieved by sharing information with other actors. In our research, we have discovered how information related to cyber security can be shared online as efficiently as possible between organisations. We used the constructive method to implement a cyber sercurity information sharing network using the Malware Information Sharing Project (MISP). The model was tested in a pilot exercise in fall 2021. The key findings in connection with the pilot showed that it is particularly important for the recipient of information security information how quickly and accurately the information security event is described. In order to help quick reaction, it would also be necessary to implement informal channels, through which security information can be shared easily without structured event descriptions.
引用
收藏
页码:45 / 55
页数:11
相关论文
共 50 条
  • [41] Information Chaos, Risk Management and Cyber Security
    Capek, Jan
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON STRATEGIC MANAGEMENT AND ITS SUPPORT BY INFORMATION SYSTEMS, 2015, : 36 - 45
  • [42] Moving beyond cyber security awareness and training to engendering security knowledge sharing
    Saad Alahmari
    Karen Renaud
    Inah Omoronyia
    Information Systems and e-Business Management, 2023, 21 : 123 - 158
  • [43] AIA launches cyber security information center
    不详
    AIRCRAFT ENGINEERING AND AEROSPACE TECHNOLOGY, 2009, 81 (04): : 382 - 383
  • [44] Managing cyber security vulnerabilities in large networks
    Chang, ES
    Jain, AK
    Slade, DM
    Tsao, SL
    BELL LABS TECHNICAL JOURNAL, 1999, 4 (04) : 252 - 272
  • [45] National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
    von Solms, Rossouw
    von Solms, Basie
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 369 - 374
  • [46] Cyber Security Competencies - Cyber Security Education and Research in Finnish Universities
    Lehto, Martti
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 179 - 188
  • [47] Managing Cyber Security Vulnerabilities in Large Networks
    Chang, Edward S.
    Jain, Aridaman K.
    Slade, David M.
    Tsao, S. Lee
    Bell Labs Technical Journal, 4 (3-4): : 252 - 272
  • [48] What kind of cyber security? Theorising cyber security and mapping approaches
    Fichtner, Laura
    INTERNET POLICY REVIEW, 2018, 7 (02):
  • [49] Cyber Security via Signaling Games: Toward a Science of Cyber Security
    Casey, William
    Morales, Jose A.
    Thomson Nguyen
    Spring, Jonathan
    Weaver, Rhiannon
    Wright, Evan
    Metcalf, Leigh
    Mishra, Bud
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 34 - 42
  • [50] What is 'Cyber Security'?: Differential Language of Cyber Security Across the Lifespan
    Jones, Simon L.
    Collins, Emily I. M.
    Levordashka, Ana
    Muir, Kate
    Joinson, Adam
    CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,