LSCJ CST 3
docx
keyboard_arrow_up
School
Oklahoma City Community College *
*We aren’t endorsed by this school
Course
4413
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
9
Uploaded by Kristampendleton
Running Head- Unit 3 CST
1
Unit 3 CST
Krista Pendleton
LSCJ:4423
I certify that I have read a student’s Guide to Academic Integrity at the University of Oklahoma,
and this paper is an original paper composed by me for this course. Except where properly cited and attributed, it has not been copied or closely reworded from any other source and has not been
submitted as a whole, or in part, for credit in any other course at OU or any other educational institution. It has not been created or submitted for any other purpose such as a job assignment at
my workplace or any other agency.
2
Unit 3 CST
A comparative analysis of cyber-threat intelligence sources, formats, and languages. (n.d.). Retrieved from https://www.mdpi.com/2079-9292/9/5/824
This research paper conducts a comparative analysis of cyber-threat intelligence sources, formats, and languages. The authors explore various sources of cyber-threat intelligence, including technical indicators, human intelligence, and open-source information, and evaluate their suitability for different settings. The paper also examines the different formats and languages used in cyber-threat intelligence reports, highlighting their strengths and weaknesses.
Actionability of cyber threat intelligence - ProQuest. (2024, February 12). https://www.proquest.com/openview/a6758eb8711f52e5bb2d76182edf43dc/1?pq-
origsite=gscholar&cbl=18750
Actionability of cyber threat intelligence refers to the practicality of using the information
gathered to take decisive steps in mitigating or addressing an imminent cyber threat. Cyber threat intelligence plays a crucial role in informing security decisions, enabling proactive defense strategies, and enhancing threat response capabilities of organizations. By leveraging this intelligence, businesses can stay ahead of cyber attackers and take necessary preventive measures to safeguard their potential cybersecurity threats. assets against
3
Adopting and integrating cyber-threat intelligence in a commercial organization. (2022, February
12). European Journal of Information Systems. https://www.tandfonline.com/doi/full/10.1080/0960085X.2022.2088414 .
Cyber-threat intelligence is essential for organizations to stay ahead of the competition and maintain a competitive edge. It helps organizations to identify, prevent, and respond to potential threats. Additionally, it helps organizations to stay proactive and adapt to changing market conditions. Cyber-threat intelligence can also help organizations to identify new opportunities and threats, as well as to optimize security controls. It can also
help to identify weaknesses in their networks and systems and to develop strategies to mitigate these risks.
A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources. (2019, February 12). https://dl.acm.org/doi/10.1145/3339252.3342112
This article presents a quantitative evaluation of trust in the quality and reliability of cyber threat intelligence sources. The authors investigate factors that influence trust, such
as source reputation, reputation management, and source credibility. Using a combination
of qualitative and quantitative methods, the study provides insights into factors that influence trust in the sources and suggests strategies for improving trust. The findings of this study are valuable for researchers and practitioners seeking to understand the impact of trust on the quality of cyber threat intelligence.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
Data-driven analytics for cyber-threat intelligence and information sharing. (2017, February 12). Computers & Security. Retrieved from https://www.sciencedirect.com/science/article/pii/S0167404817300287
This journal article discusses the use of data-driven analytics in cyber-threat intelligence and information sharing. The author emphasizes the importance of leveraging advanced data analysis techniques to detect, analyze, and respond to cyber threats. The article provides insights into various data-driven approaches and algorithms used in cyber-threat
intelligence, highlighting the advantages and challenges associated with using this approach.
From Cyber Security Information Sharing to Threat Management. (2015, October 1). https://dl.acm.org/doi/10.1145/2808128.2808133
This article explores the significance of cyber security information sharing in enhancing threat management capabilities. The authors argue that effective information sharing is crucial for organizations to effectively identify, assess, and respond to cyber threats. They
highlight the importance of trust and privacy considerations when sharing cyber security information. The article provides valuable insights into the challenges and best practices associated with cyber security information sharing, making it a valuable resource for researchers in this field.
Cyber Threat Intelligence Exchange: A Growing Requirement - ProQuest. (2024, February 12). https://www.proquest.com/openview/605586aa91b826b43c1fa4c6aea4adf7/1?pq-
origsite=gscholar&cbl=396497
5
This article provides an overview of the growing need for cyber threat intelligence exchange (CTXI) in organizations. The author emphasizes the importance of sharing timely and accurate threat intelligence among stakeholders, including government agencies, private sector entities, and cybersecurity professionals. The article highlights the benefits of CTXI, including improved situational awareness, enhanced response capabilities, and heightened resilience to cyber threats. It also discusses the challenges and potential risks associated with CTXI, providing valuable insights for researchers seeking a deeper understanding of this increasingly important aspect of cybersecurity.
Cyber Threat Intelligence Sharing for Co-Operative Defense in Multi-Domain Entities | IEEE Journals & Magazine | IEEE Xplore. (2024, February 12). https://ieeexplore.ieee.org/abstract/document/9917547
Cyber threat intelligence sharing is essential in order to protect entities from malicious attacks. Through cooperative defense, entities can share data, intelligence, and techniques
to combat cyber threats. This sharing of data is key to creating a more secure cyber environment. Cyber threat intelligence sharing is also beneficial in helping to detect and prevent new threats. By working together, entities can detect new attacks more quickly and mitigate them before they can cause any damage. Cyber threat intelligence sharing is an important tool in protecting entities from malicious attacks.
Development of Cyber Threat Intelligence System in a SOC Environment for Real Time Environment. (n.d.). RetrievedFebruary 12, 2024, from http://repo.lib.sab.ac.lk:8080/xmlui/handle/123456789/1741. (n.d.).
6
The text describes the creation of a system that focuses on identifying and analyzing potential cyber threats in real timewithin a Security Operations Center (SOC) environment. This system would be designed to collect and process data from various sources to help teams detect and respond to cyber threats more effectively
In the public interest: Cyber Threat Intelligence Sharing for Co-Operative Defense in Multi-
Domain Entities | IEEE Journals & Magazine | IEEE Xplore. (2024, February 12). https://ieeexplore.ieee.org/abstract/document/9917547
Cyber threat intelligence sharing is essential in order to protect entities from malicious attacks. Through co-operative defense, entities can share data, intelligence, and techniques to combat cyber threats. This sharing of data is key to creating a more secure cyber environment. Cyber threat intelligence sharing is also beneficial in helping to detect and prevent new threats. By working together, entities can detect new attacks more
quickly and mitigate them before they can cause any damage. Cyber threat intelligence sharing is an important tool in protecting entities from malicious attacks.
In the public interest: The privacy implications of international business-to-business sharing of cyber-threat intelligence.(n.d.). Computer Law & Security Review. https://www.sciencedirect.com/science/article/pii/S0267364916302229
The phrase "international business-to-business sharing of cyber-threat intelligence" refers
to the exchange of digital security information between different companies operating across national borders. This type of information sharing has significant implications for privacy, as it involves the transfer of potentially sensitive details about cyber threats and
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
vulnerabilities between organizations. This could potentially expose personal or confidential data to third parties, as well as raise concerns about the misuse or mishandling of this data. Therefore, it is essential to carefully consider the privacy implications of such sharing arrangements and take appropriate measures to protect sensitive information.
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection. (2024, February 12). IEEE Conference Publication. https://ieeexplore.ieee.org/abstract/document/9131721 Private entities are increasingly becoming targets of cyberattacks. It is imperative for private companies to share cyber threat information in order to protect critical infrastructure. This paper examines the legal issues associated with information sharing between private companies. It suggests that companies should consider establishing formal information-sharing agreements and outlining clear protocols for sharing cyber threat information. It also suggests that the sharing of threat information should be limited to relevant information and that companies should be proactive in protecting their
systems from cyber threats.
Sharing Cyber Threat Intelligence under the General Data Protection Regulation. (n.d.). Companies should review their data-sharing policies to ensure that data is shared with relevant authorities in a secure and confidential manner. Companies should also ensure that any data collected is only used for the intended purpose and is not misused or shared
8
without consent. Additionally, companies should ensure that they have adequate security measures in place to protect their systems from cyber threats.
U.S. Cyber Threat Intelligence Sharing Frameworks. (2016, February 12). International Journal of Intelligence and Counterintelligence. Retrieved from https://www.tandfonline.com/doi/full/10.1080/08850607.2016.1230701
This article is a comparative analysis of the different cyber-threat intelligence-sharing frameworks in the United States. It examines the purpose, objectives, and key provisions of these frameworks, considering their impact on information-sharing and collaboration efforts among government agencies and private sector organizations. The author also discusses the legal and policy challenges associated with cyber-threat intelligence sharing
and proposes strategies for enhancing the effectiveness of these frameworks.
What is Cyber Threat Intelligence and How is it Evolving?. (n.d.) Retrieved February 12, 2024, from https://onlinelibrary.wiley.com/doi/10.1002/9781119618393. Cyber Threat Intelligence (CTI) is the practice of gathering and analyzing information about existing or potential threats to computer networks and systems. It is evolving rapidly due to the introduction of new technologies, such as machine learning and artificial intelligence, that make it easier to process and exploit large amounts of data. CTI is becoming increasingly important for businesses, governments, and other organizations to protect their digital infrastructure.
9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help