2019
DOI: 10.24251/hicss.2019.859
|View full text |Cite
|
Sign up to set email alerts
|

How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations

Abstract: An increasing number of cybersecurity incidents prompts organizations to explore alternative security solutions, such as threat intelligence programs. For such programs to succeed, data needs to be collected, validated, and recorded in relevant datastores. One potential source supplying these datastores is an organization's security incident response team. However, researchers have argued that these teams focus more on eradication and recovery and less on providing feedback to enhance organizational security. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0
3

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 17 publications
0
10
0
3
Order By: Relevance
“…A significant number of research contributions, which include Grispos et al [16], Meier et al [25], and Sillaber et al [32], underline the importance of quality assurance and control for threat intelligence applications. In addition, Li et al [22] and Pinto and Sieira [28] successfully apply security metrics to measure quality criteria of common feeds of threat intelligence data.…”
Section: Application To Data Quality Assurancementioning
confidence: 99%
“…A significant number of research contributions, which include Grispos et al [16], Meier et al [25], and Sillaber et al [32], underline the importance of quality assurance and control for threat intelligence applications. In addition, Li et al [22] and Pinto and Sieira [28] successfully apply security metrics to measure quality criteria of common feeds of threat intelligence data.…”
Section: Application To Data Quality Assurancementioning
confidence: 99%
“…As a result of that research they presented various findings and recommendations regarding threat intelligence data quality. The authors of [14], focused on the topic of quality of data generated by incident response teams during investigations. Their methodology was based on a case study within a financial organization to empirically evaluate data quality.…”
Section: Challenges Of Cyber Threat Intelligencementioning
confidence: 99%
“…These fraudulent communications constitute a security incident depending on the outcome of associated activities. Academic and industrial publications continue to indicate that security incidents plague organizations; that incident recognition is critical to response scenarios and that these issues continue to have a financial and legal impact on organizations [2][3][4][5][6][7][8][9][10]. Malicious forms of communication that organizations deal with range from phishing attacks, to bogus customer reviews, to fake news.…”
Section: Introductionmentioning
confidence: 99%