Print

CYBER THREAT ACTORS AND CYBER THREAT MANAGEMENT

ALEKSANDRA STANKOVSKA

 

Abstract

Cyberspace is an exciting, dynamic and ever-evolving arena of challenge and opportunity. This paper provides an overview of cyber threats actors, cyber threat intelligence and cyber threat management. Cyber threat actors have a global reach and cyber threat mitigation strategies need to be considered through a global lens. Cyber threat intelligence and management, defined as the protection of systems, networks and data in cyberspace, is a critical issue for all businesses.

 

Key words

cyberspace, cyber threats actors, cyber threat intelligence, cyber threat management

 

References

http://www.trendmicro.co.uk/technology-innovation/cyber-security/
https://www.actiac.org/sites/default/files/cybersecurity-innovation.pdf
https://www.isightpartners.com/wpcontent/uploads/2014/07/iSIGHT_Partners_What_Is_20-20_Clarity_Brief1.pdf
http://www.ey.com/Publication/vwLUAssets/EY-cyber-threat-intelligence-how-to-get-ahead-of-cybercrime/$FILE/EY-cyber-threat-intelligence-how-to-get-ahead-of-cybercrime.pdf
https://www.ida.liu.se/~johsi32/docs/JMS_4-1_Sigholm_Non-State_Actors_in_CyberOps.pdf
http://www.circleid.com/posts/understanding_the_threat_landscape_cyber_attack_actors_and_motivations/
https://www.surfwatchlabs.com/threat-categories
https://www.globalservices.bt.com/.../financial.../Finance_sector_Cyber_Final
http://whatis.techtarget.com/definition/threat-actor
http://www.ey.com/Publication/vwLUAssets/EY-cyber-threat-intelligence-how-to-get-ahead-of-cybercrime/$FILE/EY-cyber-threat-intelligence-how-to-get-ahead-of-cybercrime.
http://www.ey.com/Publication/vwLUAssets/EY-global-information-security-survey-2014/$FILE/EY-global-information-security-survey-2014.pdf 15.http://cyber.lockheedmartin.com/hubfs/docs/Reports/ponemon-risk-and-innovation-in-cybersecurity-investments-2015.pdf
1https://www.sans.org/reading-room/whitepapers/basics/cyber-security-management-system-conceptual-mapping-591
http://www.ey.com/Publication/vwLUAssets/EY-cyber-program-management/$FILE/EY-cyber-program-management.pdf
http://www.ey.com/Publication/vwLUAssets/EY-cyber-breach-response-management/$FILE/EY-cyber-breach-response-management.pdf
www.ey.com/Publication/vwLUAssets/EY-how-do-you-find-the-criminal-before-they-commit-the-cybercrime
https://www.sans.org/reading-room/whitepapers/warfare/tools-standards-cyber-threat-intelligence-projects-34375
http://www.isaca.org/Journal/archives/2015/Volume-1/Documents/Effective-Cyberthreat-Management-Evolution-and-Beyond_joa_Eng_0115.pdf
https://www.cert.gov.uk/wp-content/uploads/2015/03/An-introduction-to-threat-intelligence.pdf
https://ioctm.org/Cyber-Threat-Management-Framework

 

Full Text: PDF (English)