Cyber Attack Surface Management System
-
Published:2023-04-27
Issue:
Volume:
Page:1-9
-
ISSN:2581-9429
-
Container-title:International Journal of Advanced Research in Science, Communication and Technology
-
language:en
-
Short-container-title:IJARSCT
Author:
Vindhya L 1, Mahima B Gowda 1, Gowramma Gaari Sindhu 1, Keerthan V 1
Affiliation:
1. SJC Institute of Technology, Chikkaballapura, Karnataka, India
Abstract
Defenders struggle to keep up with the pace of digital transformation in the face of an expanding modern enterprise attack surface and more sophisticated adversaries. A conceptual framework for relating attack surface management (ASM) to vulnerability management and cyber threat intelligence (CTI) improves cyber defense. The framework explains how ASM improves cyber resiliency in proactively detecting and responding to weaknesses that adversaries could exploit to cause unacceptable harm. Defenders should prioritize ASM aligning with the business continuity and enterprise risk management functions. A CTI-driven ASM conceptual framework (CTI-ASM) helps defenders achieve decision clarity on how best to prioritize preventing the most impactful exploitations based on adversaries’ capabilities, opportunities, and intent. Security researchers have applied decision analysis methodology to solve various security challenges generally. Applying decision analysis methodology to CTI-ASM may improve the quality of its implementation and support higher quality CTI. Potentially helpful decision analysis tools and concepts include relevance diagrams, possibility and probability trees, sensitivity analysis, corporate risk attitudes, weighing imperfect information, and accounting for cognitive biases.
Publisher
Naksh Solutions
Reference20 articles.
1. HussenMaulud, D., Zeebaree, S. R., Jacksi, K., Mohammed Sadeeq, M. A., & Hussein Sharif, K. (2021). State of art for semantic analysis of natural language processing. Qubahan Academic Journal, 1(2), 21-28. 2. Dashtipour, K., Poria, S., Hussain, A., Cambria, E., Hawalah, A. Y., Gelbukh, A., & Zhou, Q. (2016). Multilingual sentiment analysis: State of the art and independent comparison of techniques. Cognitive Computation, 8(4), 757–771. 3. Charalambous, E., Kavallieros, D., Brewster, B., Leventakis, G., &Koutras, N. (2016). Combatting Cybercrime and Sexual Exploitation of Children: An Open Source Toolkit. In Open source intelligence investigation: From strategy to implementation (pp. 233–249). essay, Springer. 4. Pastrana, S., Hutchings, A., Caines, A., & Buttery, P. (2018). International Symposium on Research in Attacks, Intrusions, and Defenses. In Research in attacks, intrusions, and Defenses:21ST International Symposium, RAID 2018, Heraklion, CRETE, Greece, September 10-12, 2018, proceedings (Vol. 11050, pp. 207–227). Cham, Switzerland; Springer. 5. Ponder-Sutton, A. M. (2016). The Automating of Open Source Intelligence. In Automating open source intelligence: Algorithms FOR OSINT (pp. 1–20). essay, Elsevier/Syngress.
|
|