dc.contributor.author |
Mtsweni, Jabu S
|
|
dc.contributor.author |
Mutemwa, Muyowa
|
|
dc.contributor.author |
Mkhonto, Njabulo
|
|
dc.date.accessioned |
2017-07-28T09:02:31Z |
|
dc.date.available |
2017-07-28T09:02:31Z |
|
dc.date.issued |
2016 |
|
dc.identifier.citation |
Mtsweni, J.S., Mutemwa, M. and Mkhonto, N. 2016. Development of a cyber-threat intelligence-sharing model from big data sources. Journal of Information Warfare, vol. 15(3): 56-68. |
en_US |
dc.identifier.issn |
1445-3312 |
|
dc.identifier.uri |
https://www.jinfowar.com/journal/volume-15-issue-3/development-cyber-threat-intelligence-sharing-model-big-data-sources
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/9342
|
|
dc.description |
Copyright: 2016 The authors. Journal of Information Warfare, vol. 15(3): 56-68 |
en_US |
dc.description.abstract |
As data in cyberspace continues to grow because of the ubiquity of Information Communication Technologies (ICT), it is becoming challenging to obtain context-aware, actionable information from Big Data to timely detect and respond to cyberattacks that are increasing in severity, complexity, and frequency. In fact, cybercriminals are developing and sharing advanced techniques for their cyber espionage, reconnaissance missions, and ultimately devastating attacks. In order to reduce cybersecurity risks and strengthen cyber resilience, strategic cybersecurity information-sharing is a necessity. This article discusses one way of handling large volumes of unstructured data that have been generated by multiple sources across different sectors into a cyber-threat intelligence-sharing model. |
en_US |
dc.language.iso |
en |
en_US |
dc.relation.ispartofseries |
Worklist;18158 |
|
dc.subject |
Cybersecurity |
en_US |
dc.subject |
Cyber-threat intelligence |
en_US |
dc.subject |
Cyber Intelligence |
en_US |
dc.subject |
Crowdsourcing |
en_US |
dc.subject |
Big data |
en_US |
dc.subject |
Web security |
en_US |
dc.subject |
Vulnerabilities |
en_US |
dc.title |
Development of a cyber-threat intelligence-sharing model from big data sources |
en_US |
dc.type |
Article |
en_US |
dc.identifier.apacitation |
Mtsweni, J. S., Mutemwa, M., & Mkhonto, N. (2016). Development of a cyber-threat intelligence-sharing model from big data sources. http://hdl.handle.net/10204/9342 |
en_ZA |
dc.identifier.chicagocitation |
Mtsweni, Jabu S, Muyowa Mutemwa, and Njabulo Mkhonto "Development of a cyber-threat intelligence-sharing model from big data sources." (2016) http://hdl.handle.net/10204/9342 |
en_ZA |
dc.identifier.vancouvercitation |
Mtsweni JS, Mutemwa M, Mkhonto N. Development of a cyber-threat intelligence-sharing model from big data sources. 2016; http://hdl.handle.net/10204/9342. |
en_ZA |
dc.identifier.ris |
TY - Article
AU - Mtsweni, Jabu S
AU - Mutemwa, Muyowa
AU - Mkhonto, Njabulo
AB - As data in cyberspace continues to grow because of the ubiquity of Information Communication Technologies (ICT), it is becoming challenging to obtain context-aware, actionable information from Big Data to timely detect and respond to cyberattacks that are increasing in severity, complexity, and frequency. In fact, cybercriminals are developing and sharing advanced techniques for their cyber espionage, reconnaissance missions, and ultimately devastating attacks. In order to reduce cybersecurity risks and strengthen cyber resilience, strategic cybersecurity information-sharing is a necessity. This article discusses one way of handling large volumes of unstructured data that have been generated by multiple sources across different sectors into a cyber-threat intelligence-sharing model.
DA - 2016
DB - ResearchSpace
DP - CSIR
KW - Cybersecurity
KW - Cyber-threat intelligence
KW - Cyber Intelligence
KW - Crowdsourcing
KW - Big data
KW - Web security
KW - Vulnerabilities
LK - https://researchspace.csir.co.za
PY - 2016
SM - 1445-3312
T1 - Development of a cyber-threat intelligence-sharing model from big data sources
TI - Development of a cyber-threat intelligence-sharing model from big data sources
UR - http://hdl.handle.net/10204/9342
ER -
|
en_ZA |