Tajudeen, Abdulquadri
Unknown Affiliation

Published : 1 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 1 Documents
Search

A Survey On Categorization Of Threat Intelligence And Trust-Based Sharing Strategies On Cyber Attack Tajudeen, Abdulquadri; Nureni, Azeez
Vokasi Unesa Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 2 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i2.36031

Abstract

Given the development of information technology both at the national and global level, security threats of organizations’ information systems are worth considering. With threats becoming more and more frequent, it’s important to have proper measures to detect, prevent, and counter threats. However, these cyber threats are not a one-time occurrence but are constantly evolving making the stratification and categorization of TI a challenge for organizations in terms of building trust with other counterparts in sharing TI. This research seeks to address these challenges by using survey on TI categorization as well as trust-based sharing mechanisms. The research is an expository research. Specifically, the research adopts a quantitative research methodology with a systematic literature review coupled with case studies to determine the TI classification, methodologies, and effectiveness of TI against cyber security vulnerability. To achieve the above objective, the study integrates the existing literature, industry research, and practical experience hence offering a comprehensive understanding of TI management practices. Findings reveal the types and sources of TI, the classification of Threat Intelligence, and methodologies and practices associated with Threat intelligence. This survey concludes that the role of TI and trust-based sharing mechanisms in fortifying organizational cyber security defenses is important. The survey recommended strategies that organizations could adopt to enhance their resilience against evolving cyber threats