Abstract

Cyber Threat Information (CTI) has emerged to help cybersecurity professionals keep abreast of and respond to rising cyber threats (CT) in real-time. This paper aims to study the impact of cyber threat intelligence on risk management in Saudi universities in mitigating cyber risks. In this survey, a comprehensive review of CTI concepts and challenges, as well as risk management and practices in higher education, is presented. Previous literature was reviewed from theses, reviews, and books on the factors influencing the increase of cyber threats and CTI as well as risk management in higher education. A brief discussion of previous studies and their contribution to the current paper and the impact of CTI on risk management to reduce risk. An extensive search of more than 65 research papers was conducted and 28 were cited in this survey. Cyber threats are changing in addition to the huge flow of information about them and dealing with these threats on time requires advance and deep information about the nature of these threats and how to take appropriate defensive measures, and this is what defines the concept of CTI. The use of cyber threat information in risk management enhances the ability of defenders to mitigate growing cyber threats.

Highlights

  • In the twenty-first century, the world is witnessing a technological revolution and a qualitative shift in the field of cybersecurity significantly

  • This paper aims to identify the role of Cyber Threat Information (CTI) applications in risk management in the Kingdom of Saudi Arabia

  • Despite the current development in cybersecurity, there is a new generation of advanced threats that can bypass traditional defenses as these defenses were designed to combat a previous generation of attacks

Read more

Summary

Introduction

In the twenty-first century, the world is witnessing a technological revolution and a qualitative shift in the field of cybersecurity significantly. It is distinguished by its ability to bypass traditional defenses, such as intrusion prevention systems or firewalls, etc. It has been considered effective for the previous generation of threats. The authors in [3] hypothesize that the old approach renders traditional defenses vulnerable to complex threats because they exploit unknown vulnerabilities. This requires the need to prepare for these threats through cyber threat intelligence. With this technological revolution, systems have become more complex, resulting in lower levels of security. The authors add in [3] it has grown into threats and funds that are financed and organized for financial gain or political ends

Objectives
Discussion
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.