2023
DOI: 10.1007/978-3-031-25460-4_12
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Security Impact Analysis Framework: A Risk-Based and MITRE Attack Approach

Abstract: HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d'enseignement et de recherche français ou étrangers, des labor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…There are promising avenues for enhancing cyber risk management elicitation processes through a socio-technical approach and fostering a culture of cybersecurity within an organisation supported by a security operational centre (SOC) [79]. Avenues for expansion to international collaboration are essential to develop a common Cyber Threat Intelligence for cadastral data, with medium-term development of tactics, techniques, and procedures (TTP) [88] based on MITRE ATT&CK [89,90] and their sharing between LAS, and with the long-term goal of building dedicated regional and international Computer Security Incident Response Team (CSIRT) Land Administration, as advocated by UNECE [91,92], integrated in multi-stakeholder structure diplomacy for cybersecurity [93].…”
Section: Discussionmentioning
confidence: 99%
“…There are promising avenues for enhancing cyber risk management elicitation processes through a socio-technical approach and fostering a culture of cybersecurity within an organisation supported by a security operational centre (SOC) [79]. Avenues for expansion to international collaboration are essential to develop a common Cyber Threat Intelligence for cadastral data, with medium-term development of tactics, techniques, and procedures (TTP) [88] based on MITRE ATT&CK [89,90] and their sharing between LAS, and with the long-term goal of building dedicated regional and international Computer Security Incident Response Team (CSIRT) Land Administration, as advocated by UNECE [91,92], integrated in multi-stakeholder structure diplomacy for cybersecurity [93].…”
Section: Discussionmentioning
confidence: 99%
“…However, the described methodology does not account explicitly for cyber threat intelligence information and accounts only for vulnerabilities and threat correlation. In [46], a framework is proposed to utilize the MITRE ATT&CK knowledge base in the risk assessment to provide sufficient evidence during the development lifecycle. The framework describes workflows to create strategic, operational, and technical scenarios based on the EBIOS methodology, with explicit consideration for cyber threat intelligence and its continuous information feeds.…”
Section: Cyber Threat Intelligence and Cyber Risk Management Integrationmentioning
confidence: 99%
“…Moreover, with the scenario-based risk evaluation, it incorporates strategic and operational attack paths, that are identified based on threat actors objectives and the existing scope. These attack paths can be constructed based on threat actors' behaviors, as in [46], by considering threat intelligence information. These enhancements improve accuracy and provide realistic results, enhancing risk assessment scenarios and treatment.…”
Section: The Proposed Enhanced Cyber Threat Intelligence Integrated E...mentioning
confidence: 99%
See 2 more Smart Citations