Claim Missing Document
Check
Articles

Found 2 Documents
Search

Cyber Threat Intelligence – Issue and Challenges Md Sahrom Abu; Siti Rahayu Selamat; Aswami Ariffin; Robiah Yusof
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp371-379

Abstract

Today threat landscape evolving at the rapid rate with many organization continuously face complex and malicious cyber threats. Cybercriminal equipped by better skill, organized and well-funded than before. Cyber Threat Intelligence (CTI) has become a hot topic and being under consideration for many organization to counter the rise of cyber-attacks. The aim of this paper is to review the existing research related to CTI. Through the literature review process, the most basic question of what CTI is examines by comparing existing definitions to find common ground or disagreements. It is found that both organization and vendors lack a complete understanding of what information is considered to be CTI, hence more research is needed in order to define CTI. This paper also identified current CTI product and services that include threat intelligence data feeds, threat intelligence standards and tools that being used in CTI. There is an effort by specific industry to shared only relevance threat intelligence data feeds such as Financial Services Information Sharing and Analysis Center (FS-ISAC) that collaborate on critical security threats facing by global financial services sector only. While research and development center such as MITRE working in developing a standards format (e.g.; STIX, TAXII, CybOX) for threat intelligence sharing to solve interoperability issue between threat sharing peers. Based on the review for CTI definition, standards and tools, this paper identifies four research challenges in cyber threat intelligence and analyses contemporary work carried out in each. With an organization flooded with voluminous of threat data, the requirement for qualified threat data analyst to fully utilize CTI and turn the data into actionable intelligence become more important than ever. The data quality is not a new issue but with the growing adoption of CTI, further research in this area is needed.
Comparative Study on Preventing Security Attacks in Automated Gate System Erman Hamid; Hani Maisarah Zainal Subari; Norharyati Harum; Robiah Yusof
Conference on Business, Social Sciences and Technology (CoNeScINTech) Vol 3 No 1 (2023): Conference on Business, Social Sciences and Technology (CoNeScINTech)
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/conescintech.v3i1.8332

Abstract

This study is conducted to identify the current approach to preventing security attacks in one of the Internet of Things – the Automated Gate System. The question of vulnerability of the Automated Gate System is a critical issue as this system acts as a front line that protects an organization from any security intrusion. A sound security system leads to the cyber and physical security of the organization, enabling the organization to move forward in achieving management goals. The focus is specifically on methods and techniques for security elements used in previous studies, prompting answers to questions on security mechanisms to Automated Gate Systems that are practical and reliable. The literature review shows various studies conducted on this issue, focusing on how an IoT system for automated gates operates, how it works logically and physically, the security level, and the extent to which a gate system is immune from hacking. This study employed the Content Analysis technique, meaning the previous research data were analyzed and summarized scientifically. It continued with interviews conducted with experts and owners of the Automated Gate System. It is a series of activities analyzing and summarizing the scientific 'data' produced by previous research and interviews. The 'data' refers to spoken, written, or visual pictures, words, symbols, meanings, ideas, diagrams, or any message that can be analyzed. The study then focused on a final comparison involving three security techniques on the IoT Gate System: a QR Code System, RFID System, and Vehicle License Plate Recognition System, which is a reliable but practical technique for an IoT Automated Gate System. This study ultimately offers future work to analyze the three selected Automated Gate Systems with a selected security testing technique, with the objective of security but with practical financial capabilities.