How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations

01/11/2019
by   George Grispos, et al.
0

An increasing number of cybersecurity incidents prompts organizations to explore alternative security solutions, such as threat intelligence programs. For such programs to succeed, data needs to be collected, validated, and recorded in relevant datastores. One potential source supplying these datastores is an organization's security incident response team. However, researchers have argued that these teams focus more on eradication and recovery and less on providing feedback to enhance organizational security. This prompts the idea that data collected during security incident investigations may be of insufficient quality for threat intelligence analysis. While previous discussions focus on data quality issues from threat intelligence sharing perspectives, minimal research examines the data generated during incident response investigations. This paper presents the results of a case study identifying data quality challenges in a Fortune 500 organization's incident response team. Furthermore, the paper provides the foundation for future research regarding data quality concerns in security incident response.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/05/2023

Advanced Security Threat Modelling for Blockchain-Based FinTech Applications

Cybersecurity threats and vulnerabilities continue to grow in number and...
research
03/28/2021

Data-Driven Threat Hunting Using Sysmon

Threat actors can be persistent, motivated and agile, and leverage a div...
research
12/19/2021

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

Threat information sharing is considered as one of the proactive defensi...
research
01/28/2023

The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox

Recently, bug-bounty programs have gained popularity and become a signif...
research
08/26/2022

Factors Influencing the Organizational Decision to Outsource IT Security: A Review and Research Agenda

IT security outsourcing is the process of contracting a third-party secu...
research
08/02/2022

A replication of a controlled experiment with two STRIDE variants

To avoid costly security patching after software deployment, security-by...
research
06/23/2018

A Recursive PLS (Partial Least Squares) based Approach for Enterprise Threat Management

Most of the existing solutions to enterprise threat management are preve...

Please sign up or login with your details

Forgot password? Click here to reset