{"title":"组织网络威胁情报模型","authors":"Z. C. Khan, Thulile Mkhwanazi, M. Masango","doi":"10.1109/icABCD59051.2023.10220503","DOIUrl":null,"url":null,"abstract":"As cyber attacks are increasing in South Africa, organisations need to strengthen cyber security controls. Cyber Threat Intelligence is an essential component of a Cybersecurity program but is often overlooked. It can assist to identify future and potential cyber threats. Organisations process large volumes of data containing Cyber Threat Intelligence, but this is often not collected, processed, or considered as Cyber Threat Intelligence. South African organizations will continue to feel the repercussions of cyber-attacks if actions are not taken. To bring clarity and allow South African organizations to leverage on Cyber Threat Intelligence, this work aims to categorize Cyber Threat Intelligence for organizations. Several characteristics of Cyber Threat Intelligence are discussed, and thereafter a model is presented. The applicability of this model is demonstrated by a short use-case.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"47 1","pages":"1-7"},"PeriodicalIF":2.6000,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Model for Cyber Threat Intelligence for Organisations\",\"authors\":\"Z. C. Khan, Thulile Mkhwanazi, M. Masango\",\"doi\":\"10.1109/icABCD59051.2023.10220503\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As cyber attacks are increasing in South Africa, organisations need to strengthen cyber security controls. Cyber Threat Intelligence is an essential component of a Cybersecurity program but is often overlooked. It can assist to identify future and potential cyber threats. Organisations process large volumes of data containing Cyber Threat Intelligence, but this is often not collected, processed, or considered as Cyber Threat Intelligence. South African organizations will continue to feel the repercussions of cyber-attacks if actions are not taken. To bring clarity and allow South African organizations to leverage on Cyber Threat Intelligence, this work aims to categorize Cyber Threat Intelligence for organizations. Several characteristics of Cyber Threat Intelligence are discussed, and thereafter a model is presented. The applicability of this model is demonstrated by a short use-case.\",\"PeriodicalId\":51314,\"journal\":{\"name\":\"Big Data\",\"volume\":\"47 1\",\"pages\":\"1-7\"},\"PeriodicalIF\":2.6000,\"publicationDate\":\"2023-08-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Big Data\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1109/icABCD59051.2023.10220503\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Big Data","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/icABCD59051.2023.10220503","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
A Model for Cyber Threat Intelligence for Organisations
As cyber attacks are increasing in South Africa, organisations need to strengthen cyber security controls. Cyber Threat Intelligence is an essential component of a Cybersecurity program but is often overlooked. It can assist to identify future and potential cyber threats. Organisations process large volumes of data containing Cyber Threat Intelligence, but this is often not collected, processed, or considered as Cyber Threat Intelligence. South African organizations will continue to feel the repercussions of cyber-attacks if actions are not taken. To bring clarity and allow South African organizations to leverage on Cyber Threat Intelligence, this work aims to categorize Cyber Threat Intelligence for organizations. Several characteristics of Cyber Threat Intelligence are discussed, and thereafter a model is presented. The applicability of this model is demonstrated by a short use-case.
Big DataCOMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS-COMPUTER SCIENCE, THEORY & METHODS
CiteScore
9.10
自引率
2.20%
发文量
60
期刊介绍:
Big Data is the leading peer-reviewed journal covering the challenges and opportunities in collecting, analyzing, and disseminating vast amounts of data. The Journal addresses questions surrounding this powerful and growing field of data science and facilitates the efforts of researchers, business managers, analysts, developers, data scientists, physicists, statisticians, infrastructure developers, academics, and policymakers to improve operations, profitability, and communications within their businesses and institutions.
Spanning a broad array of disciplines focusing on novel big data technologies, policies, and innovations, the Journal brings together the community to address current challenges and enforce effective efforts to organize, store, disseminate, protect, manipulate, and, most importantly, find the most effective strategies to make this incredible amount of information work to benefit society, industry, academia, and government.
Big Data coverage includes:
Big data industry standards,
New technologies being developed specifically for big data,
Data acquisition, cleaning, distribution, and best practices,
Data protection, privacy, and policy,
Business interests from research to product,
The changing role of business intelligence,
Visualization and design principles of big data infrastructures,
Physical interfaces and robotics,
Social networking advantages for Facebook, Twitter, Amazon, Google, etc,
Opportunities around big data and how companies can harness it to their advantage.