ResearchSpace

Cyber threat intelligence exchange: A growing requirement

Show simple item record

dc.contributor.author Veerasamy, Namosha
dc.date.accessioned 2017-08-22T13:09:23Z
dc.date.available 2017-08-22T13:09:23Z
dc.date.issued 2017-06
dc.identifier.citation Veerasamy, N. 2017. Cyber threat intelligence exchange: A growing requirement. Proceedings of the 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, 29-30 June 2017, p. 513-518 en_US
dc.identifier.uri http://toc.proceedings.com/35467webtoc.pdf http://www.proceedings.com/35467.html
dc.identifier.uri http://hdl.handle.net/10204/9462
dc.description Proceedings of the 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, 29-30 June 2017 en_US
dc.description.abstract Managing the rise of cyber-attacks has become a growing challenge. Cyber space has become a battleground of threats ranging from malware to phishing, spam and password theft. Cybersecurity solutions mainly try to take a defensive stance and build a wall around pertinent technologies in an effort to protect them. However, perpetrators still manage to find a way to infiltrate networks and systems. This is where cyber intelligence can play a fundamental role. Cyber intelligence provides an alternative route for countering complex threats as it provides a collated manner in which to gain new insights and develop detective and reactive actions. Cyber intelligence supports the understanding of not only known threats and also looks to investigating the source, motivation and capabilities of the attacker. Cyber threat intelligence sharing encompasses various sources, uses, types of data, tools, skills and challenges. This paper proposes a framework that places these various aspects in perspective in order to provide background information for the initiation of a cyber threat intelligence sharing and exchange initiative. en_US
dc.language.iso en en_US
dc.relation.ispartofseries Worklist;19277
dc.subject Cyber Threat en_US
dc.subject Cyber attack en_US
dc.subject Cyber intelligence en_US
dc.title Cyber threat intelligence exchange: A growing requirement en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Veerasamy, N. (2017). Cyber threat intelligence exchange: A growing requirement. http://hdl.handle.net/10204/9462 en_ZA
dc.identifier.chicagocitation Veerasamy, Namosha. "Cyber threat intelligence exchange: A growing requirement." (2017): http://hdl.handle.net/10204/9462 en_ZA
dc.identifier.vancouvercitation Veerasamy N, Cyber threat intelligence exchange: A growing requirement; 2017. http://hdl.handle.net/10204/9462 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Veerasamy, Namosha AB - Managing the rise of cyber-attacks has become a growing challenge. Cyber space has become a battleground of threats ranging from malware to phishing, spam and password theft. Cybersecurity solutions mainly try to take a defensive stance and build a wall around pertinent technologies in an effort to protect them. However, perpetrators still manage to find a way to infiltrate networks and systems. This is where cyber intelligence can play a fundamental role. Cyber intelligence provides an alternative route for countering complex threats as it provides a collated manner in which to gain new insights and develop detective and reactive actions. Cyber intelligence supports the understanding of not only known threats and also looks to investigating the source, motivation and capabilities of the attacker. Cyber threat intelligence sharing encompasses various sources, uses, types of data, tools, skills and challenges. This paper proposes a framework that places these various aspects in perspective in order to provide background information for the initiation of a cyber threat intelligence sharing and exchange initiative. DA - 2017-06 DB - ResearchSpace DP - CSIR KW - Cyber Threat KW - Cyber attack KW - Cyber intelligence LK - https://researchspace.csir.co.za PY - 2017 T1 - Cyber threat intelligence exchange: A growing requirement TI - Cyber threat intelligence exchange: A growing requirement UR - http://hdl.handle.net/10204/9462 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record