Interoperability challenges in the cybersecurity information sharing ecosystem

Authors: Rantos, K., Spyros, A., Papanikolaou, A., Kritsas, A., Ilioudis, C. and Katos, V.

Journal: Computers

Volume: 9

Issue: 1

eISSN: 2073-431X

DOI: 10.3390/computers9010018

Abstract:

Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an attack and its containment. This is achieved by continuously providing information, accompanied by data, on existing and emerging cyber threats and vulnerabilities affecting corporate networks. This paper addresses challenges that organisations are bound to face when they decide to invest in effective and interoperable cybersecurity information sharing and categorises them in a layered model. Based on this, it provides an evaluation of existing sources that share cybersecurity information. The aim of this research is to help organisations improve their cyber threat information exchange capabilities, to enhance their security posture and be more prepared against emerging threats.

https://eprints.bournemouth.ac.uk/33698/

Source: Scopus

Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem

Authors: Rantos, K., Spyros, A., Papanikolaou, A., Kritsas, A., Ilioudis, C. and Katos, V.

Journal: COMPUTERS

Volume: 9

Issue: 1

ISSN: 2073-431X

DOI: 10.3390/computers9010018

https://eprints.bournemouth.ac.uk/33698/

Source: Web of Science (Lite)

Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem

Authors: Rantos, K., Arnolnt, S., Papanikolaou, A., Kritsas, A., Ilioudis, C. and Katos, V.

Journal: Computers

Volume: 9

Issue: 1

Pages: 1-18

Publisher: MDPI

ISSN: 0738-0569

DOI: 10.3390/computers9010018

Abstract:

Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an attack and its containment. This is achieved by continuously providing information, accompanied by data, on existing and emerging cyber threats and vulnerabilities affecting corporate networks. This paper addresses challenges that organisations are bound to face when they decide to invest in effective and interoperable cybersecurity information sharing and categorises them in a layered model. Based on this, it provides an evaluation of existing sources that share cybersecurity information. The aim of this research is to help organisations improve their cyber threat information exchange capabilities, to enhance their security posture and be more prepared against emerging threats.

https://eprints.bournemouth.ac.uk/33698/

Source: Manual

Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem

Authors: Rantos, K., Arnolnt, S., Papanikolaou, A., Kritsas, A., Ilioudis, C. and Katos, V.

Journal: Computers

Volume: 9

Issue: 1

Pages: 1-18

ISSN: 0738-0569

Abstract:

Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an attack and its containment. This is achieved by continuously providing information, accompanied by data, on existing and emerging cyber threats and vulnerabilities affecting corporate networks. This paper addresses challenges that organisations are bound to face when they decide to invest in effective and interoperable cybersecurity information sharing and categorises them in a layered model. Based on this, it provides an evaluation of existing sources that share cybersecurity information. The aim of this research is to help organisations improve their cyber threat information exchange capabilities, to enhance their security posture and be more prepared against emerging threats.

https://eprints.bournemouth.ac.uk/33698/

Source: BURO EPrints