网络威胁情报在改进安全运营方面的有效性

Joshua Smallman
{"title":"网络威胁情报在改进安全运营方面的有效性","authors":"Joshua Smallman","doi":"10.60087/jaigs.v5i1.193","DOIUrl":null,"url":null,"abstract":"The purpose of this research was to comprehensively evaluate the effectiveness of Cyber Threat Intelligence (CTI) in enhancing security operations, while simultaneously identifying the various barriers to its adoption. Additionally, the study aimed to provide potential solutions to mitigate the identified barriers, to ensure successful adoption of CTI.A systematic review was undertaken to identify the main factors of enhanced security operations. Relevant questions and statements were then developed from these factors and a questionnaire was created using Google Forms. These questionnaires were then distributed via email to a sample size of 50 information technology professionals. These results were then analyzed using Microsoft Excel and SPSS. Overall, the research revealed that companies who used CTI reported significant gains in threat detection and response, risk management and threat-hunting abilities, which in turn lead to enhanced security operations. According to the research, several factors prevented organizations from adopting CTI. Among these were technological, regulatory, ignorance-related, and lack of executive support. Finally, to tackle these identified barriers the following were proposed adopting comprehensive awareness and education programs, the formation of an Executive CTI Steering Committees, structured CTI training and skills development programs, technology assessment and modernization initiative-based initiatives, proactive compliance, and legal strategies.","PeriodicalId":517201,"journal":{"name":"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023","volume":"27 12","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Effectiveness of Cyber Threat Intelligence in Improving Security Operations\",\"authors\":\"Joshua Smallman\",\"doi\":\"10.60087/jaigs.v5i1.193\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The purpose of this research was to comprehensively evaluate the effectiveness of Cyber Threat Intelligence (CTI) in enhancing security operations, while simultaneously identifying the various barriers to its adoption. Additionally, the study aimed to provide potential solutions to mitigate the identified barriers, to ensure successful adoption of CTI.A systematic review was undertaken to identify the main factors of enhanced security operations. Relevant questions and statements were then developed from these factors and a questionnaire was created using Google Forms. These questionnaires were then distributed via email to a sample size of 50 information technology professionals. These results were then analyzed using Microsoft Excel and SPSS. Overall, the research revealed that companies who used CTI reported significant gains in threat detection and response, risk management and threat-hunting abilities, which in turn lead to enhanced security operations. According to the research, several factors prevented organizations from adopting CTI. Among these were technological, regulatory, ignorance-related, and lack of executive support. Finally, to tackle these identified barriers the following were proposed adopting comprehensive awareness and education programs, the formation of an Executive CTI Steering Committees, structured CTI training and skills development programs, technology assessment and modernization initiative-based initiatives, proactive compliance, and legal strategies.\",\"PeriodicalId\":517201,\"journal\":{\"name\":\"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023\",\"volume\":\"27 12\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.60087/jaigs.v5i1.193\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.60087/jaigs.v5i1.193","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本研究的目的是全面评估网络威胁情报(CTI)在加强安全行动方面的有效性,同时确定采用 CTI 的各种障碍。此外,本研究还旨在提供潜在的解决方案,以减少已确定的障碍,确保成功采用 CTI。然后根据这些因素提出了相关问题和陈述,并使用谷歌表格制作了调查问卷。然后通过电子邮件向 50 名信息技术专业人员发放了这些问卷。然后使用 Microsoft Excel 和 SPSS 对这些结果进行了分析。总体而言,研究表明,使用 CTI 的公司在威胁检测和响应、风险管理和威胁猎取能力方面都有显著提高,这反过来又增强了安全运营。研究发现,有几个因素阻碍了企业采用 CTI。其中包括技术、监管、无知以及缺乏执行支持。最后,为解决这些已发现的障碍,研究人员提出了以下建议:采用全面的意识和教育计划、组建 CTI 执行指导委员会、结构化 CTI 培训和技能开发计划、技术评估和基于现代化倡议的计划、主动合规和法律战略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
The Effectiveness of Cyber Threat Intelligence in Improving Security Operations
The purpose of this research was to comprehensively evaluate the effectiveness of Cyber Threat Intelligence (CTI) in enhancing security operations, while simultaneously identifying the various barriers to its adoption. Additionally, the study aimed to provide potential solutions to mitigate the identified barriers, to ensure successful adoption of CTI.A systematic review was undertaken to identify the main factors of enhanced security operations. Relevant questions and statements were then developed from these factors and a questionnaire was created using Google Forms. These questionnaires were then distributed via email to a sample size of 50 information technology professionals. These results were then analyzed using Microsoft Excel and SPSS. Overall, the research revealed that companies who used CTI reported significant gains in threat detection and response, risk management and threat-hunting abilities, which in turn lead to enhanced security operations. According to the research, several factors prevented organizations from adopting CTI. Among these were technological, regulatory, ignorance-related, and lack of executive support. Finally, to tackle these identified barriers the following were proposed adopting comprehensive awareness and education programs, the formation of an Executive CTI Steering Committees, structured CTI training and skills development programs, technology assessment and modernization initiative-based initiatives, proactive compliance, and legal strategies.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
LLM-Cloud Complete: Leveraging Cloud Computing for Efficient Large Language Model-based Code Completion Utilizing the Internet of Things (IoT), Artificial Intelligence, Machine Learning, and Vehicle Telematics for Sustainable Growth in Small and Medium Firms (SMEs) Role of Artificial Intelligence and Big Data in Sustainable Entrepreneurship Impact of AI on Education: Innovative Tools and Trends Critique of Modern Feminism
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1