Managing the rise of cyber-attacks has become a growing challenge. Cyber space has become a battleground of threats ranging from malware to phishing, spam and password theft. Cybersecurity solutions mainly try to take a defensive stance and build a wall around pertinent technologies in an effort to protect them. However, perpetrators still manage to find a way to infiltrate networks and systems. This is where cyber intelligence can play a fundamental role. Cyber intelligence provides an alternative route for countering complex threats as it provides a collated manner in which to gain new insights and develop detective and reactive actions. Cyber intelligence supports the understanding of not only known threats and also looks to investigating the source, motivation and capabilities of the attacker. Cyber threat intelligence sharing encompasses various sources, uses, types of data, tools, skills and challenges. This paper proposes a framework that places these various aspects in perspective in order to provide background information for the initiation of a cyber threat intelligence sharing and exchange initiative.
Reference:
Veerasamy, N. 2017. Cyber threat intelligence exchange: A growing requirement. Proceedings of the 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, 29-30 June 2017, p. 513-518
Veerasamy, N. (2017). Cyber threat intelligence exchange: A growing requirement. http://hdl.handle.net/10204/9462