語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Managing Cybersecurity and Privacy Risks of Cyber Threat Intelliegence.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Managing Cybersecurity and Privacy Risks of Cyber Threat Intelliegence./
作者:
Albakri, Adham.
面頁冊數:
1 online resource (217 pages)
附註:
Source: Dissertations Abstracts International, Volume: 84-08, Section: A.
Contained By:
Dissertations Abstracts International84-08A.
標題:
Personal information. -
電子資源:
click for full text (PQDT)
ISBN:
9798371938282
Managing Cybersecurity and Privacy Risks of Cyber Threat Intelliegence.
Albakri, Adham.
Managing Cybersecurity and Privacy Risks of Cyber Threat Intelliegence.
- 1 online resource (217 pages)
Source: Dissertations Abstracts International, Volume: 84-08, Section: A.
Thesis (Ph.D.)--University of Kent (United Kingdom), 2021.
Includes bibliographical references
In recent years, the number of cyber-attacks that affect critical infrastructures such as health, telecommunications and banks has been rapidly increasing. Sharing Cyber Threat Intelligence (CTI) is being encouraged and mandated as a way of improving overall cyber intelligence and defence, but its take up is slow. Organisations may well be justified in perceiving risks in sharing and disclosing cyber incident information, but they tend to express such worries in broad and vague terms. There are risks of breaching regulations and laws regarding privacy. With laws and regulations such as the General Data Protection Regulation (GDPR), the managers of CTI datasets need clear guidance on how and when it is legal to share such information. This thesis supports the decision of sharing CTI datasets as it proposes a novel contribution through a detailed understanding of which information in cyber incident reports requires protection against specific threats with assessed severity.It presents a specific and granular analysis of the risks in cyber incident information sharing, looking in detail at what information may be contained in incident reports and which specific risks are associated with its disclosure. It provides a set of guidelines for the disciplined use of the STIX incident model in order to reduce information security risk. Then, it proposes a quantitative risk model to assess the risk of sharing CTI datasets enabled by sharing with different entities in various situations. The evaluation of the cyber incident model analysis and the quantative risk model has been validated by means of experts' opinions.As a final contribution, this thesis defines the impact that GDPR legal aspects may have on the sharing of CTI that helps technical people and CTI managers with limited legal expertise to encompass legal consideration before sharing CTI datasets. In addition, it recommends protection levels for sharing CTI to ensure compliance with the GDPR.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2024
Mode of access: World Wide Web
ISBN: 9798371938282Subjects--Topical Terms:
1466893
Personal information.
Index Terms--Genre/Form:
554714
Electronic books.
Managing Cybersecurity and Privacy Risks of Cyber Threat Intelliegence.
LDR
:03281ntm a22003737 4500
001
1143989
005
20240531084202.5
006
m o d
007
cr mn ---uuuuu
008
250605s2021 xx obm 000 0 eng d
020
$a
9798371938282
035
$a
(MiAaPQ)AAI30256672
035
$a
(MiAaPQ)UnivKentCanterbury90779
035
$a
AAI30256672
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Albakri, Adham.
$3
1468863
245
1 0
$a
Managing Cybersecurity and Privacy Risks of Cyber Threat Intelliegence.
264
0
$c
2021
300
$a
1 online resource (217 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertations Abstracts International, Volume: 84-08, Section: A.
500
$a
Advisor: Boiten, Eerke.
502
$a
Thesis (Ph.D.)--University of Kent (United Kingdom), 2021.
504
$a
Includes bibliographical references
520
$a
In recent years, the number of cyber-attacks that affect critical infrastructures such as health, telecommunications and banks has been rapidly increasing. Sharing Cyber Threat Intelligence (CTI) is being encouraged and mandated as a way of improving overall cyber intelligence and defence, but its take up is slow. Organisations may well be justified in perceiving risks in sharing and disclosing cyber incident information, but they tend to express such worries in broad and vague terms. There are risks of breaching regulations and laws regarding privacy. With laws and regulations such as the General Data Protection Regulation (GDPR), the managers of CTI datasets need clear guidance on how and when it is legal to share such information. This thesis supports the decision of sharing CTI datasets as it proposes a novel contribution through a detailed understanding of which information in cyber incident reports requires protection against specific threats with assessed severity.It presents a specific and granular analysis of the risks in cyber incident information sharing, looking in detail at what information may be contained in incident reports and which specific risks are associated with its disclosure. It provides a set of guidelines for the disciplined use of the STIX incident model in order to reduce information security risk. Then, it proposes a quantitative risk model to assess the risk of sharing CTI datasets enabled by sharing with different entities in various situations. The evaluation of the cyber incident model analysis and the quantative risk model has been validated by means of experts' opinions.As a final contribution, this thesis defines the impact that GDPR legal aspects may have on the sharing of CTI that helps technical people and CTI managers with limited legal expertise to encompass legal consideration before sharing CTI datasets. In addition, it recommends protection levels for sharing CTI to ensure compliance with the GDPR.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2024
538
$a
Mode of access: World Wide Web
650
4
$a
Personal information.
$3
1466893
650
4
$a
Data integrity.
$3
1061124
650
4
$a
Threats.
$3
871765
650
4
$a
Computer security.
$3
557122
650
4
$a
Confidentiality.
$3
1343685
650
4
$a
Decision making.
$3
528319
650
4
$a
Malware.
$3
1468864
650
4
$a
Privacy.
$3
575491
650
4
$a
Civil engineering.
$3
561339
650
4
$a
Computer science.
$3
573171
650
4
$a
Information technology.
$3
559429
650
4
$a
Web studies.
$3
1148502
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0543
690
$a
0984
690
$a
0501
690
$a
0489
690
$a
0646
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
University of Kent (United Kingdom).
$3
1467152
773
0
$t
Dissertations Abstracts International
$g
84-08A.
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=30256672
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入
第一次登入時,112年前入學、到職者,密碼請使用身分證號登入;112年後入學、到職者,密碼請使用身分證號"後六碼"登入,請注意帳號密碼有區分大小寫!
帳號(學號)
密碼
請在此電腦上記得個人資料
取消
忘記密碼? (請注意!您必須已在系統登記E-mail信箱方能使用。)