关联决策理论与网络威胁情报:新视角

Neha Akella, None Manas Kumar Yogi
{"title":"关联决策理论与网络威胁情报:新视角","authors":"Neha Akella, None Manas Kumar Yogi","doi":"10.36548/jsws.2023.3.004","DOIUrl":null,"url":null,"abstract":"An organization, with the help of cyber threat intelligence framework, can protect itself from the cyber threats. The stakeholder cyber safety is paramount and such intelligence frameworks help leveraging the business value of its intellectual properties. Events related to securing the cyber aspects of an organization are possible by connecting it with essential features of decision theory. Few assumptions are made pertaining to descriptive, prescriptive and normative decision theory which help in identification of cyber weakness and security loopholes of an organization. This study extracts novel viewpoints from the strongholds of decision theoretical models and propagates decisions on how to face the cyber-attacks.","PeriodicalId":488591,"journal":{"name":"IRO Journal On Sustainable Wireless Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Correlating Decision Theory with Cyber Threat Intelligence: Novel Perspectives\",\"authors\":\"Neha Akella, None Manas Kumar Yogi\",\"doi\":\"10.36548/jsws.2023.3.004\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An organization, with the help of cyber threat intelligence framework, can protect itself from the cyber threats. The stakeholder cyber safety is paramount and such intelligence frameworks help leveraging the business value of its intellectual properties. Events related to securing the cyber aspects of an organization are possible by connecting it with essential features of decision theory. Few assumptions are made pertaining to descriptive, prescriptive and normative decision theory which help in identification of cyber weakness and security loopholes of an organization. This study extracts novel viewpoints from the strongholds of decision theoretical models and propagates decisions on how to face the cyber-attacks.\",\"PeriodicalId\":488591,\"journal\":{\"name\":\"IRO Journal On Sustainable Wireless Systems\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IRO Journal On Sustainable Wireless Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.36548/jsws.2023.3.004\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IRO Journal On Sustainable Wireless Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36548/jsws.2023.3.004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在网络威胁情报框架的帮助下,组织可以保护自己免受网络威胁。利益相关者的网络安全至关重要,此类情报框架有助于利用其知识产权的商业价值。通过将其与决策理论的基本特征联系起来,与保护组织的网络方面相关的事件是可能的。很少有关于描述性,规范性和规范性决策理论的假设,有助于识别组织的网络弱点和安全漏洞。本研究从决策理论模型的据点中提取新的观点,并传播如何面对网络攻击的决策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Correlating Decision Theory with Cyber Threat Intelligence: Novel Perspectives
An organization, with the help of cyber threat intelligence framework, can protect itself from the cyber threats. The stakeholder cyber safety is paramount and such intelligence frameworks help leveraging the business value of its intellectual properties. Events related to securing the cyber aspects of an organization are possible by connecting it with essential features of decision theory. Few assumptions are made pertaining to descriptive, prescriptive and normative decision theory which help in identification of cyber weakness and security loopholes of an organization. This study extracts novel viewpoints from the strongholds of decision theoretical models and propagates decisions on how to face the cyber-attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信