Cyber Threat Intelligence in Risk Management A Survey of the Impact of Cyber Threat Intelligence on Saudi Higher Education Risk Management

被引:0
|
作者
Aljuhami, Amira M. [1 ]
Bamasoud, Doaa M. [1 ]
机构
[1] Univ Bisha, Coll Comp & Informat Technol, Dept IS, Bisha, Saudi Arabia
关键词
Cyber threat intelligence; risk management; cyberthreat; cyber security; FRAMEWORK;
D O I
10.14569/IJACSA.2021.0121018
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber Threat Information (CTI) has emerged to help cybersecurity professionals keep abreast of and respond to rising cyber threats (CT) in real-time. This paper aims to study the impact of cyber threat intelligence on risk management in Saudi universities in mitigating cyber risks. In this survey, a comprehensive review of CTI concepts and challenges, as well as risk management and practices in higher education, is presented. Previous literature was reviewed from theses, reviews, and books on the factors influencing the increase of cyber threats and CTI as well as risk management in higher education. A brief discussion of previous studies and their contribution to the current paper and the impact of CTI on risk management to reduce risk. An extensive search of more than 65 research papers was conducted and 28 were cited in this survey. Cyber threats are changing in addition to the huge flow of information about them and dealing with these threats on time requires advance and deep information about the nature of these threats and how to take appropriate defensive measures, and this is what defines the concept of CTI. The use of cyber threat information in risk management enhances the ability of defenders to mitigate growing cyber threats.
引用
收藏
页码:156 / 164
页数:9
相关论文
共 50 条
  • [41] Cyber Threat Intelligence: A Product Without a Process?
    Oosthoek, Kris
    Doerr, Christian
    INTERNATIONAL JOURNAL OF INTELLIGENCE AND COUNTERINTELLIGENCE, 2021, 34 (02) : 300 - 315
  • [42] CTIoT: A Cyber Threat Intelligence Tool for IoT
    El Jaouhari, Saad
    Ahmed, Shaikh
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 1483 - 1489
  • [43] On the dissemination of Cyber Threat Intelligence through Hyperledger
    Moubarak, Joanna
    Bassil, Carole
    Antoun, Joe
    2021 17TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS (DRCN), 2021,
  • [44] Measuring and visualizing cyber threat intelligence quality
    Schlette, Daniel
    Boehm, Fabian
    Caselli, Marco
    Pernul, Guenther
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (01) : 21 - 38
  • [45] Current approaches and future directions for Cyber Threat Intelligence sharing: A survey
    Alaeifar, Poopak
    Pal, Shantanu
    Jadidi, Zahra
    Hussain, Mukhtar
    Foo, Ernest
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [46] Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI)
    Aliyu, Aliyu
    He, Ying
    Yevseyeva, Iryna
    Luo, Cunjin
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [47] IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence
    Puchta, Alexander
    Baumer, Thomas
    Mueller, Mathis
    Pernul, Guenther
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVIII, DBSEC 2024, 2024, 14901 : 44 - 52
  • [48] Cyber-threat perception and risk management in the Swedish financial sector
    Varga, Stefan
    Brynielsson, Joel
    Franke, Ulrik
    COMPUTERS & SECURITY, 2021, 105
  • [49] Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment
    Rios, Valeria Valdes
    Zaidi, Fatiha
    Cavalli, Ana Rosa
    Rego, Angel
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [50] Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)
    Samtani, Sagar
    Chen, Hsinchun
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2149 - 2150