Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection

被引:0
|
作者
Nweke, Livinus Obiora [1 ]
Wolthusen, Stephen [1 ,2 ]
机构
[1] Norwegian Univ Sci & Technol NTNU, Informat Secur & Commun Technol, Gjovik, Norway
[2] Royal Holloway Univ London, Sch Math & Informat Secur, Egham, Surrey, England
关键词
legal issues; CTI sharing; GDPR; critical infrastructure protection;
D O I
10.23919/cycon49761.2020.9131721
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The menace of cyber attacks has become a concern for both the public and private sectors. Several approaches have been proposed to tackle the challenge, but an approach that has received widespread acceptance among cyber security professionals in both public and private sectors is cyber threat information (CTI) sharing. CTI refers to any information that can help an organisation identify, assess, monitor and respond to cyber threats. It includes indicators of compromise; tactics, techniques and procedures used by threat actors; suggested actions to detect, contain, or prevent attacks; and the findings from the analyses of incidents. Sharing CTI has been proposed as an efficient and effective way of improving overall cyber intelligence and defence. However, there are sources of liability that may dissuade private entities from participating in such sharing. The most cited source of liability is privacy and data protection law; although antitrust law, tort of negligence law and intellectual property law are also cited as potential sources of liability. In this study, we review the extent to which the provisions of privacy and data protection law support or refute the sharing of CTI. This will provide guidance and incentives for private entities willing to participate in CTI sharing, especially for critical infrastructure protection.
引用
收藏
页码:63 / 78
页数:16
相关论文
共 10 条
  • [1] Freedom of information implications of information sharing networks for critical infrastructure protection
    Lane, Bill
    Corones, Stephen
    Hedge, Susan
    Clapperton, Dale
    AUSTRALIAN JOURNAL OF ADMINISTRATIVE LAW, 2008, 15 (04):
  • [2] Information Sharing and Trust Between Sharing Parties: Sharing Sensitive Information With Regards to Critical Information Infrastructure Protection
    Mohideen, Feroze
    Ellefsen, Ian
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 197 - 206
  • [3] Managing trust in critical infrastructure protection information sharing systems
    Sabo, JT
    ISSE 2004 - SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 271 - 280
  • [4] Critical Infrastructure Protection: The need for evolving standards Mutating cyber-space and security issues in ITS
    Santoro, Vincenzo
    Pensato, L.
    2017 5TH IEEE INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2017, : 219 - 222
  • [5] Governance Models Preferences for Security Information Sharing: An Institutional Economics Perspective for Critical Infrastructure Protection
    Mermoud, Alain
    Keupp, Marcus Matthias
    David, Dimitri Percia
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2018), 2019, 11260 : 179 - 190
  • [6] It Takes Two to Tango Public-Private Information Management to Advance Critical Infrastructure Protection
    Borchert, Heiko
    EUROPEAN JOURNAL OF RISK REGULATION, 2015, 6 (02) : 208 - 218
  • [7] Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection
    Mermoud, Alain
    Keupp, Marcus Matthias
    Ghernaouti, Solange
    David, Dimitri Percia
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2016), 2018, 10242 : 150 - 162
  • [8] Building Collaborative Cybersecurity for Critical Infrastructure Protection: Empirical Evidence of Collective Intelligence Information Sharing Dynamics on ThreatFox
    Jolles, Eric
    Gillard, Sebastien
    David, Dimitri Percia
    Strohmeier, Martin
    Mermoud, Alain
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2022, 2023, 13723 : 140 - 157
  • [9] The Cyber-Security State of our Nation: A Critique of South Africa's Stance on Cyber-Security in Respect of the Protection of Critical Information Infrastructure
    Mohideen, Feroze
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 235 - 243
  • [10] Commercial Satellites, Critical Information Infrastructure Protection, and Preventing Today's Threat Actors from Becoming Tomorrow's Captain Midnight
    Young, Brian
    STRATEGIC CYBER DEFENSE: A MULTIDISCIPLINARY PERSPECTIVE, 2017, 48 : 86 - 97