2020
DOI: 10.3389/fcomp.2020.00036
|View full text |Cite
|
Sign up to set email alerts
|

The Challenges of Leveraging Threat Intelligence to Stop Data Breaches

Abstract: Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing significantly. The financial consequences of a data breach are set on the rise, but the cost goes beyond potential fines. Data breaches could have a catastrophic impact not only in loss of company's reputation and stock price, but also in economic terms. Threat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 52 publications
0
12
0
Order By: Relevance
“…To ensure sustainable protection against attacks, it is necessary to au- tomate extracting TI and evidence-based insights from data sources. While keeping up with the complexity and adaptability of current cybersecurity threats, Artificial Intelligence (AI)driven security solutions provide automated security solutions to detect zero-day threats [20]. In this regard, we utilize intelligence-driven solutions (such as data analytics and TI) in DTs that can help to identify existing vulnerabilities, faulty models, malicious actors, and potential attack vectors, thereby minimizing the threat landscape and improving the CPSs.…”
Section: Inconsistencies ?mentioning
confidence: 99%
“…To ensure sustainable protection against attacks, it is necessary to au- tomate extracting TI and evidence-based insights from data sources. While keeping up with the complexity and adaptability of current cybersecurity threats, Artificial Intelligence (AI)driven security solutions provide automated security solutions to detect zero-day threats [20]. In this regard, we utilize intelligence-driven solutions (such as data analytics and TI) in DTs that can help to identify existing vulnerabilities, faulty models, malicious actors, and potential attack vectors, thereby minimizing the threat landscape and improving the CPSs.…”
Section: Inconsistencies ?mentioning
confidence: 99%
“…Data leakage is one of the main cybersecurity issues and it will affect the digital economy (Confente et al, 2019;Ibrahim et al, 2020). Unfortunately, data leakages carry a variety of direct and indirect cost factors and these factors are critical to the survival and competitiveness of the organizations.…”
Section: Reasons Of Threat Intelligence Leakagementioning
confidence: 99%
“…Some less sophisticated attacks can be perpetrated with the goal of service disruption, such as a DDOS attack, but can also serve as a decoy for a more sophisticated action; this was the case of the Carphone Warehouse data breach in 2015 where a DDOS attack was launched to distract it's IT team while a coordinated attack was launched on its systems that resulted in the theft of 2.4 million customer records [1].…”
Section: Data Breach Threatsmentioning
confidence: 99%
“…Two fundamental aspects of data breaches are data loss and data leakage whose handling is addressed very differently; Data loss may result from the intentional or unintentional, with or without malicious or wrongful intent handling and transfer of data by an inside user but is a vector that can be addressed in a fairly straightforward way through the use of Data Loss Prevention solutions and policies; Data leakage is usually intentional and results from the direct actions of external hackers. These are far more difficult to predict, detect and detain [1].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation