scholarly journals Cyber-Threat Information-Sharing Standards: A Review of Evaluation Literature

Author(s):  
Nenekazi N. P. Mkuzangwe ◽  
Zubeida C. Khan

Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, are essential to combatting today’s increasingly frequent and sophisticated cyber-attacks. Several cyber-threat information-sharing standards exist, but there is at present no single standard or set of standards widely adopted by organisations and by computer security incident response teams (CSIRTs) operating at organisational, sectoral, national, and international levels. This introduces an interoperability problem in respect of communication across the various organisations and CSIRTs. Harmonised adoption of threat information-sharing standards would be of great benefit to cybersecurity efforts. In an effort to support harmonised use of cyber-threat information-sharing standards, this article provides findings from a review of the extant literature on such standards.

2014 ◽  
Vol 12 (5) ◽  
pp. 61-67 ◽  
Author(s):  
Tiffani R. Chen ◽  
Daniel B. Shore ◽  
Stephen J. Zaccaro ◽  
Reeshad S. Dalal ◽  
Lois E. Tetrick ◽  
...  

2010 ◽  
Vol 37 (1) ◽  
pp. 852-870 ◽  
Author(s):  
Huy Kang Kim ◽  
Kwang Hyuk Im ◽  
Sang Chan Park

2015 ◽  
pp. 56.1-56.39
Author(s):  
Michael Miora ◽  
M. E. Kabay ◽  
Bernie Cowens

2004 ◽  
Vol 2004 (11) ◽  
pp. 5-7 ◽  
Author(s):  
John M. Salomon ◽  
Patrik Elsa

1998 ◽  
Author(s):  
Moira West-Brown ◽  
Don Stikvoort ◽  
Klaus-Peter Kossakowski

2019 ◽  
Vol 214 ◽  
pp. 08001
Author(s):  
Tadashi Murakami ◽  
Fukuko Yuasa ◽  
Ryouichi Baba ◽  
Teiji Nakamura ◽  
Kiyoharu Hashimoto ◽  
...  

This work aims to provide KEK general-purpose network to support various research activities in the fields of high-energy physics, material physics, and accelerator physics. Since the end of the 20th century, on a daily basis, networks experience cyber-attacks and the methods of attack have rapidly evolved to become more sophisticated over the years. Security measures have been developed to mitigate the effects of cyber-attacks. While security measures may improve safety, restrictions might reduce usability. Therefore, we must keep a balance between safety and usability of the network for a smooth running of research activities. Herein, we present our long-term experience with keeping a balance between safety and usability in KEK research activities. The key points are reasonably ensuring traceability and security management. We have been using security devices, such as firewalls, intrusion detection systems, and vulnerability management systems, to achieve a balance between safety and usability. Also, we present activities of the computer security incident response team (CSIRT) and collaborative activities among research organizations.


Sign in / Sign up

Export Citation Format

Share Document