Cargando…
A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. Cyber threat intelligence (CTI) enhances organizational cybersecurity resilience by obtaining, processing, evaluating, and disseminating information about potential risks and...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10459806/ https://www.ncbi.nlm.nih.gov/pubmed/37631808 http://dx.doi.org/10.3390/s23167273 |
_version_ | 1785097500214951936 |
---|---|
author | Saeed, Saqib Suayyid, Sarah A. Al-Ghamdi, Manal S. Al-Muhaisen, Hayfa Almuhaideb, Abdullah M. |
author_facet | Saeed, Saqib Suayyid, Sarah A. Al-Ghamdi, Manal S. Al-Muhaisen, Hayfa Almuhaideb, Abdullah M. |
author_sort | Saeed, Saqib |
collection | PubMed |
description | Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. Cyber threat intelligence (CTI) enhances organizational cybersecurity resilience by obtaining, processing, evaluating, and disseminating information about potential risks and opportunities inside the cyber domain. This research investigates how companies can employ CTI to improve their precautionary measures against security breaches. The study follows a systematic review methodology, including selecting primary studies based on specific criteria and quality valuation of the selected papers. As a result, a comprehensive framework is proposed for implementing CTI in organizations. The proposed framework is comprised of a knowledge base, detection models, and visualization dashboards. The detection model layer consists of behavior-based, signature-based, and anomaly-based detection. In contrast, the knowledge base layer contains information resources on possible threats, vulnerabilities, and dangers to key assets. The visualization dashboard layer provides an overview of key metrics related to cyber threats, such as an organizational risk meter, the number of attacks detected, types of attacks, and their severity level. This relevant systematic study also provides insight for future studies, such as how organizations can tailor their approach to their needs and resources to facilitate more effective collaboration between stakeholders while navigating legal/regulatory constraints related to information sharing. |
format | Online Article Text |
id | pubmed-10459806 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-104598062023-08-27 A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience Saeed, Saqib Suayyid, Sarah A. Al-Ghamdi, Manal S. Al-Muhaisen, Hayfa Almuhaideb, Abdullah M. Sensors (Basel) Review Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. Cyber threat intelligence (CTI) enhances organizational cybersecurity resilience by obtaining, processing, evaluating, and disseminating information about potential risks and opportunities inside the cyber domain. This research investigates how companies can employ CTI to improve their precautionary measures against security breaches. The study follows a systematic review methodology, including selecting primary studies based on specific criteria and quality valuation of the selected papers. As a result, a comprehensive framework is proposed for implementing CTI in organizations. The proposed framework is comprised of a knowledge base, detection models, and visualization dashboards. The detection model layer consists of behavior-based, signature-based, and anomaly-based detection. In contrast, the knowledge base layer contains information resources on possible threats, vulnerabilities, and dangers to key assets. The visualization dashboard layer provides an overview of key metrics related to cyber threats, such as an organizational risk meter, the number of attacks detected, types of attacks, and their severity level. This relevant systematic study also provides insight for future studies, such as how organizations can tailor their approach to their needs and resources to facilitate more effective collaboration between stakeholders while navigating legal/regulatory constraints related to information sharing. MDPI 2023-08-19 /pmc/articles/PMC10459806/ /pubmed/37631808 http://dx.doi.org/10.3390/s23167273 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Saeed, Saqib Suayyid, Sarah A. Al-Ghamdi, Manal S. Al-Muhaisen, Hayfa Almuhaideb, Abdullah M. A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience |
title | A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience |
title_full | A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience |
title_fullStr | A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience |
title_full_unstemmed | A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience |
title_short | A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience |
title_sort | systematic literature review on cyber threat intelligence for organizational cybersecurity resilience |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10459806/ https://www.ncbi.nlm.nih.gov/pubmed/37631808 http://dx.doi.org/10.3390/s23167273 |
work_keys_str_mv | AT saeedsaqib asystematicliteraturereviewoncyberthreatintelligencefororganizationalcybersecurityresilience AT suayyidsaraha asystematicliteraturereviewoncyberthreatintelligencefororganizationalcybersecurityresilience AT alghamdimanals asystematicliteraturereviewoncyberthreatintelligencefororganizationalcybersecurityresilience AT almuhaisenhayfa asystematicliteraturereviewoncyberthreatintelligencefororganizationalcybersecurityresilience AT almuhaidebabdullahm asystematicliteraturereviewoncyberthreatintelligencefororganizationalcybersecurityresilience AT saeedsaqib systematicliteraturereviewoncyberthreatintelligencefororganizationalcybersecurityresilience AT suayyidsaraha systematicliteraturereviewoncyberthreatintelligencefororganizationalcybersecurityresilience AT alghamdimanals systematicliteraturereviewoncyberthreatintelligencefororganizationalcybersecurityresilience AT almuhaisenhayfa systematicliteraturereviewoncyberthreatintelligencefororganizationalcybersecurityresilience AT almuhaidebabdullahm systematicliteraturereviewoncyberthreatintelligencefororganizationalcybersecurityresilience |