Journal:Interoperability challenges in the cybersecurity information sharing ecosystem

From LIMSWiki
Revision as of 19:27, 26 October 2020 by Shawndouglas (talk | contribs) (Created stub. Saving and adding more.)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search
Full article title Interoperability challenges in the cybersecurity information sharing ecosystem
Journal Computers
Author(s) Rantos, Konstantinos; Spyros, Arnolnt, Spyros; Papanikolaou, Alexandros; Kritsas, Antonios; Ilioudis, Christos; Katos, Vasilios
Author affiliation(s) International Hellenic University, Innovative Secure Technologies, Bournemouth University
Primary contact Email: krantos at cs dot ihu dot gr
Year published 2020
Volume and issue 9(1)
Article # 18
DOI 10.3390/computers9010018
ISSN 2073-431X
Distribution license Creative Commons Attribution 4.0 International
Website https://www.mdpi.com/2073-431X/9/1/18/htm
Download https://www.mdpi.com/2073-431X/9/1/18/pdf (PDF)

Abstract

Threat intelligence helps businesses and organizations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimized and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an attack and its containment. This is achieved by continuously providing information, accompanied by data, on existing and emerging cyber threats and vulnerabilities affecting corporate networks. This paper addresses challenges that organizations are bound to face when they decide to invest in effective and interoperable cybersecurity information sharing, and it categorizes them in a layered model. Based on this, it provides an evaluation of existing sources that share cybersecurity information. The aim of this research is to help organizations improve their cyber threat information exchange capabilities, to enhance their security posture and be more prepared against emerging threats.

Keywords: cyber threat information, cyber threat intelligence, interoperability, cybersecurity, evaluation

Introduction

References

Notes

This presentation is faithful to the original, with only a few minor changes to presentation, grammar, and punctuation. In some cases important information was missing from the references, and that information was added.