The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Cyber-Security Intelligence Gathering: Issues With Knowledge Management
Abstract
Recently, KM has found applications in cyber-security. Though the actionable information gathered is intangible, they are used to improve knowledge sharing in organizations. Key cyber-security objectives are to prevent, detect and respond to threats. Using open-sharing of vulnerabilities and exploits, cyber risks could be mitigated through info-sharing. Cyber-intelligence is perceived as a process and a product, with outcomes being alerts that solicit explicit responses, leading to mitigation of possible threats. Using the Scrum approach, relevant articles and databases were reviewed, towards improving mitigation strategies. A virtual machine experiment utilized various tools to gather intelligence. Results from footprinting were used to design a KM-based Cyber-Intelligence Gathering model that incorporates Lewin's Change Theory. It is intuitive and serves as an effective mitigation strategy for most organizations, especially SMEs. The implication is that knowledge sharing could be harnessed to create a pool of mitigation resources for most enterprises in developing economies.
Related Content
Preethi, Sapna R., Mohammed Mujeer Ulla.
© 2023.
16 pages.
|
Srividya P..
© 2023.
12 pages.
|
Preeti Sahu.
© 2023.
15 pages.
|
Vandana Niranjan.
© 2023.
23 pages.
|
S. Darwin, E. Fantin Irudaya Raj, M. Appadurai, M. Chithambara Thanu.
© 2023.
33 pages.
|
Shankara Murthy H. M., Niranjana Rai, Ramakrishna N. Hegde.
© 2023.
23 pages.
|
Jothimani K., Bhagya Jyothi K. L..
© 2023.
19 pages.
|
|
|