The Implementation of Strategic Threat Intelligence for Business Organization
DOI:
https://doi.org/10.33736/jita.3398.2021Keywords:
Strategic, Data Intelligence, Threat, Business Organization, Threat Intelligence, Strategic Threat IntelligenceAbstract
Nowadays strategic threat intelligence is very important to all the organization. Strategic cyber threat intelligence can determine who and why to provide key insights to the organization. It purpose is to determine who is behind a particular threat or threat family and addressing to evolving trends. The strategic level of cyber threat intelligence also included and explains about why. Why makes a company or an organization a target? Strategic Threat Intelligence offer the overview of the threat status of the organization. Therefore, the C-Suite include chief executive officer (CEO), chief financial officer (CFO), chief operating officer (COO) and chief information officer (CIO) of the organization use cyber threat intelligence data to understand the high-level trends and threats to the company or the organization. The C-Suite of the organization also need to know how to implement the strategic threat intelligence to prevent unexpected things happen. This research paper aims to discuss about the importance of the strategic threat intelligence to the company or organization and how to implement it. After knowing and understanding the implementation of strategic threat intelligence to the company or organization, this research paper also will discuss about the when of using strategic threat intelligence. The issue and challenges is also discussed in the article.
References
Bromiley, M. (2016). Threat Intelligence: What It Is, and How to Use It Effectively. A SANS Whitepaper.
Chandel, S., Yan, M., Chen, S., Jiang, H., & Ni, T.-Y. (2019). Threat Intelligence Sharing Community: A Countermeasure Against Advanced Persistent Threat. 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR). https://doi.org/10.1109/mipr.2019.00070
Confente, I., Siciliano, G. G., Gaudenzi, B., & Eickhoff, M. (2019). Effects of data breaches from user-generated content: A corporate reputation analysis. European Management Journal, 37(4), 492–504. https://doi.org/10.1016/j.emj.2019.01.007
Conti, M., Dargahi, T., & Dehghantanha, A. (2018). Cyber Threat Intelligence: Challenges and Opportunities. Advances in Information Security, 1–6. https://doi.org/10.1007/978-3-319-73951-9_1
Dasgupta, D., Roy, A., & Nag, A. (2017). Multi-Factor Authentication. Infosys Science Foundation Series, 185–233. https://doi.org/10.1007/978-3-319-58808-7_5
Dog, S. E., Tweed, A., Rouse, L. R., Chu, B., Qi, D., Hu, Y., … Al-Shaer, E. (2016). Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs. 2016 25th International Conference on Computer Communication and Networks (ICCCN). https://doi.org/10.1109/icccn.2016.7568578
Fadillah, M. (2019). REVIEW OF COFFEE MARKETING STRATEGIES IN BUSINESS COMPETITION. SCIENTIFIC JOURNAL OF REFLECTION: Economic, Accounting, Management and Business, 2(2), 131-140. https://doi.org/10.37481/sjr.v2i2.59
GÜREL, E. (2017). SWOT ANALYSIS: A THEORETICAL REVIEW. Journal of International Social Research, 10(51), 994–1006. https://doi.org/10.17719/jisr.2017.1832
Ibrahim, A., Thiruvady, D., Schneider, J.-G., & Abdelrazek, M. (2020). The Challenges of Leveraging Threat Intelligence to Stop Data Breaches. Frontiers in Computer Science, 2. https://doi.org/10.3389/fcomp.2020.00036
Johnson, C. S., Badger, M. L., Waltermire, D. A., Snyder, J., & Skorupka, C. (2016). Guide to Cyber Threat Information Sharing. https://doi.org/10.6028/nist.sp.800-150
KPMG. (2013). Cyber threat intelligence and the lessons from law enforcement. KPMG Cybersecurity.
Landon-Murray, M. (2016). Big Data and Intelligence: Applications, Human Capital, and Education. Journal of Strategic Security, 9(2), 94–123. https://doi.org/10.5038/1944-0472.9.2.1514
McMillan, R. (2013). Definition: Threat Intelligence. Gartner.
Moustafa, N., Adi, E., Turnbull, B., & Hu, J. (2018). A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems. IEEE Access, 6, 32910–32924. https://doi.org/10.1109/access.2018.2844794
Piplai, A., Mittal, S., Abdelsalam, M., Gupta, M., Joshi, A., & Finin, T. (2020). Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior. 2020 IEEE International Conference on Intelligence and Security Informatics (ISI). https://doi.org/10.1109/isi49825.2020.9280512
Puyt, R., Lie, F. B., De Graaf, F. J., & Wilderom, C. P. M. (2020). Origins of SWOT Analysis. Academy of Management Proceedings, 2020(1), 17416. https://doi.org/10.5465/ambpp.2020.132
Sahrom Abu, M., Rahayu Selamat, S., Ariffin, A., & Yusof, R. (2018). Cyber Threat Intelligence – Issue and Challenges. Indonesian Journal of Electrical Engineering and Computer Science, 10(1), 371. https://doi.org/10.11591/ijeecs.v10.i1.pp371-379
Tounsi, W., & Rais, H. (2018). A survey on technical threat intelligence in the age of sophisticated cyber attacks. Computers & Security, 72, 212–233. https://doi.org/10.1016/j.cose.2017.09.001
Verizon, D. (2020). Data Breach Investigations Report 2020. Computer Fraud & Security, 2020(6), 4. https://doi.org/10.1016/s1361-3723(20)30059-2
Downloads
Published
How to Cite
Issue
Section
License
Copyright Transfer Statement for Journal
1) In signing this statement, the author(s) grant UNIMAS Publisher an exclusive license to publish their original research papers. The author(s) also grant UNIMAS Publisher permission to reproduce, recreate, translate, extract or summarize, and to distribute and display in any forms, formats, and media. The author(s) can reuse their papers in their future printed work without first requiring permission from UNIMAS Publisher, provided that the author(s) acknowledge and reference publication in the Journal.
2) For open access articles, the author(s) agree that their articles published under UNIMAS Publisher are distributed under the terms of the CC-BY-NC-SA (Creative Commons Attribution-Non Commercial-Share Alike 4.0 International License) which permits unrestricted use, distribution, and reproduction in any medium, for non-commercial purposes, provided the original work of the author(s) is properly cited.
3) For subscription articles, the author(s) agree that UNIMAS Publisher holds copyright, or an exclusive license to publish. Readers or users may view, download, print, and copy the content, for academic purposes, subject to the following conditions of use: (a) any reuse of materials is subject to permission from UNIMAS Publisher; (b) archived materials may only be used for academic research; (c) archived materials may not be used for commercial purposes, which include but not limited to monetary compensation by means of sale, resale, license, transfer of copyright, loan, etc.; and (d) archived materials may not be re-published in any part, either in print or online.
4) The author(s) is/are responsible to ensure his or her or their submitted work is original and does not infringe any existing copyright, trademark, patent, statutory right, or propriety right of others. Corresponding author(s) has (have) obtained permission from all co-authors prior to submission to the journal. Upon submission of the manuscript, the author(s) agree that no similar work has been or will be submitted or published elsewhere in any language. If submitted manuscript includes materials from others, the authors have obtained the permission from the copyright owners.
5) In signing this statement, the author(s) declare(s) that the researches in which they have conducted are in compliance with the current laws of the respective country and UNIMAS Journal Publication Ethics Policy. Any experimentation or research involving human or the use of animal samples must obtain approval from Human or Animal Ethics Committee in their respective institutions. The author(s) agree and understand that UNIMAS Publisher is not responsible for any compensational claims or failure caused by the author(s) in fulfilling the above-mentioned requirements. The author(s) must accept the responsibility for releasing their materials upon request by Chief Editor or UNIMAS Publisher.
6) The author(s) should have participated sufficiently in the work and ensured the appropriateness of the content of the article. The author(s) should also agree that he or she has no commercial attachments (e.g. patent or license arrangement, equity interest, consultancies, etc.) that might pose any conflict of interest with the submitted manuscript. The author(s) also agree to make any relevant materials and data available upon request by the editor or UNIMAS Publisher.