Reference model to identify the maturity level of cyber threat Intelligence on the Dark Web
Descripción del Articulo
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado.
| Autores: | , , |
|---|---|
| Formato: | artículo |
| Fecha de Publicación: | 2021 |
| Institución: | Universidad Peruana de Ciencias Aplicadas |
| Repositorio: | UPC-Institucional |
| Lenguaje: | inglés |
| OAI Identifier: | oai:repositorioacademico.upc.edu.pe:10757/653788 |
| Enlace del recurso: | https://doi.org/10.1007/978-3-030-57548-9_15 http://hdl.handle.net/10757/653788 |
| Nivel de acceso: | acceso abierto |
| Materia: | Cyber threat intelligence Cybersecurity Dark web Maturity model Information assets Intelligence tool Maturity levels Reference modeling Technology managers https://purl.org/pe-repo/ocde/ford#2.11.00 |
| id |
UUPC_f4ce20a0bfb6043a68cbed1552fcaa91 |
|---|---|
| oai_identifier_str |
oai:repositorioacademico.upc.edu.pe:10757/653788 |
| network_acronym_str |
UUPC |
| network_name_str |
UPC-Institucional |
| repository_id_str |
2670 |
| dc.title.en_US.fl_str_mv |
Reference model to identify the maturity level of cyber threat Intelligence on the Dark Web |
| title |
Reference model to identify the maturity level of cyber threat Intelligence on the Dark Web |
| spellingShingle |
Reference model to identify the maturity level of cyber threat Intelligence on the Dark Web Santos, Ricardo Meléndez Cyber threat intelligence Cybersecurity Dark web Maturity model Information assets Intelligence tool Maturity levels Reference modeling Technology managers https://purl.org/pe-repo/ocde/ford#2.11.00 |
| title_short |
Reference model to identify the maturity level of cyber threat Intelligence on the Dark Web |
| title_full |
Reference model to identify the maturity level of cyber threat Intelligence on the Dark Web |
| title_fullStr |
Reference model to identify the maturity level of cyber threat Intelligence on the Dark Web |
| title_full_unstemmed |
Reference model to identify the maturity level of cyber threat Intelligence on the Dark Web |
| title_sort |
Reference model to identify the maturity level of cyber threat Intelligence on the Dark Web |
| author |
Santos, Ricardo Meléndez |
| author_facet |
Santos, Ricardo Meléndez Gallardo, Anthony Aguilar Aguirre, Jimmy Armas |
| author_role |
author |
| author2 |
Gallardo, Anthony Aguilar Aguirre, Jimmy Armas |
| author2_role |
author author |
| dc.contributor.author.fl_str_mv |
Santos, Ricardo Meléndez Gallardo, Anthony Aguilar Aguirre, Jimmy Armas |
| dc.subject.en_US.fl_str_mv |
Cyber threat intelligence Cybersecurity Dark web Maturity model Information assets Intelligence tool Maturity levels Reference modeling Technology managers |
| topic |
Cyber threat intelligence Cybersecurity Dark web Maturity model Information assets Intelligence tool Maturity levels Reference modeling Technology managers https://purl.org/pe-repo/ocde/ford#2.11.00 |
| dc.subject.ocde.none.fl_str_mv |
https://purl.org/pe-repo/ocde/ford#2.11.00 |
| description |
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado. |
| publishDate |
2021 |
| dc.date.accessioned.none.fl_str_mv |
2021-01-07T18:27:49Z |
| dc.date.available.none.fl_str_mv |
2021-01-07T18:27:49Z |
| dc.date.issued.fl_str_mv |
2021-01-01 |
| dc.type.es_PE.fl_str_mv |
info:eu-repo/semantics/article |
| dc.type.version.none.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a2515 |
| format |
article |
| dc.identifier.issn.none.fl_str_mv |
21903018 |
| dc.identifier.doi.none.fl_str_mv |
https://doi.org/10.1007/978-3-030-57548-9_15 |
| dc.identifier.uri.none.fl_str_mv |
http://hdl.handle.net/10757/653788 |
| dc.identifier.eissn.none.fl_str_mv |
21903026 |
| dc.identifier.journal.en_US.fl_str_mv |
Smart Innovation, Systems and Technologies |
| dc.identifier.eid.none.fl_str_mv |
2-s2.0-85098151594 |
| dc.identifier.scopusid.none.fl_str_mv |
SCOPUS_ID:85098151594 |
| dc.identifier.isni.none.fl_str_mv |
0000 0001 2196 144X |
| identifier_str_mv |
21903018 21903026 Smart Innovation, Systems and Technologies 2-s2.0-85098151594 SCOPUS_ID:85098151594 0000 0001 2196 144X |
| url |
https://doi.org/10.1007/978-3-030-57548-9_15 http://hdl.handle.net/10757/653788 |
| dc.language.iso.en_US.fl_str_mv |
eng |
| language |
eng |
| dc.relation.url.en_US.fl_str_mv |
https://www.scopus.com/record/display.uri?eid=2-s2.0-85098151594&doi=10.1007%2f978-3-030-57548-9_15&origin=inward&txGid=e2613bebe1265409308d5eb2634d2ffe |
| dc.rights.en_US.fl_str_mv |
info:eu-repo/semantics/openAccess |
| eu_rights_str_mv |
openAccess |
| dc.publisher.none.fl_str_mv |
Springer Science and Business Media Deutschland GmbH |
| publisher.none.fl_str_mv |
Springer Science and Business Media Deutschland GmbH |
| dc.source.es_PE.fl_str_mv |
Repositorio Academico - UPC Universidad Peruana de Ciencias Aplicadas (UPC) |
| dc.source.none.fl_str_mv |
reponame:UPC-Institucional instname:Universidad Peruana de Ciencias Aplicadas instacron:UPC |
| instname_str |
Universidad Peruana de Ciencias Aplicadas |
| instacron_str |
UPC |
| institution |
UPC |
| reponame_str |
UPC-Institucional |
| collection |
UPC-Institucional |
| dc.source.journaltitle.none.fl_str_mv |
Smart Innovation, Systems and Technologies |
| dc.source.volume.none.fl_str_mv |
201 |
| dc.source.beginpage.none.fl_str_mv |
161 |
| dc.source.endpage.none.fl_str_mv |
172 |
| bitstream.url.fl_str_mv |
https://repositorioacademico.upc.edu.pe/bitstream/10757/653788/1/license.txt |
| bitstream.checksum.fl_str_mv |
8a4605be74aa9ea9d79846c1fba20a33 |
| bitstream.checksumAlgorithm.fl_str_mv |
MD5 |
| repository.name.fl_str_mv |
Repositorio Académico UPC |
| repository.mail.fl_str_mv |
upc@openrepository.com |
| _version_ |
1863823538364874752 |
| spelling |
61cd7236fdfd2b0657577397f971d7af2fdd1f04803bff88bcafd44f17e17cff57271547b56bded3d3c12f72b4928d75Santos, Ricardo MeléndezGallardo, Anthony AguilarAguirre, Jimmy Armas2021-01-07T18:27:49Z2021-01-07T18:27:49Z2021-01-0121903018https://doi.org/10.1007/978-3-030-57548-9_15http://hdl.handle.net/10757/65378821903026Smart Innovation, Systems and Technologies2-s2.0-85098151594SCOPUS_ID:850981515940000 0001 2196 144XEl texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado.In this article, we propose a reference model to identify the maturity level of the cyber intelligence threat process. This proposal considers the dark web as an important source of cyber threats causing a latent risk that organizations do not consider in their cybersecurity strategies. The proposed model aims to increase the maturity level of the process through a set of proposed controls according to the information found on the dark web. The model consists of three phases: (1) Identification of information assets using cyber threat intelligence tools. (2) Diagnosis of the exposure of information assets. (3) Proposal of controls according to the proposed categories and criteria. The validation of the proposal was carried out in an insurance institution in Lima, Peru, with data obtained by the institution. The measurement was made with artifacts that allowed to obtain an initial value of the current panorama of the company. Preliminary results showed 196 emails and passwords exposed on the dark web of which one corresponded to the technology manager of the company under evaluation. With this identification, it was diagnosed that the institution was at a “Normal” maturity level, and from the implementation of the proposed controls, the “Advanced” level was reached.Revisión por paresengSpringer Science and Business Media Deutschland GmbHhttps://www.scopus.com/record/display.uri?eid=2-s2.0-85098151594&doi=10.1007%2f978-3-030-57548-9_15&origin=inward&txGid=e2613bebe1265409308d5eb2634d2ffeinfo:eu-repo/semantics/openAccessRepositorio Academico - UPCUniversidad Peruana de Ciencias Aplicadas (UPC)Smart Innovation, Systems and Technologies201161172reponame:UPC-Institucionalinstname:Universidad Peruana de Ciencias Aplicadasinstacron:UPCCyber threat intelligenceCybersecurityDark webMaturity modelInformation assetsIntelligence toolMaturity levelsReference modelingTechnology managershttps://purl.org/pe-repo/ocde/ford#2.11.00Reference model to identify the maturity level of cyber threat Intelligence on the Dark Webinfo:eu-repo/semantics/articlehttp://purl.org/coar/version/c_970fb48d4fbd8a2515LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorioacademico.upc.edu.pe/bitstream/10757/653788/1/license.txt8a4605be74aa9ea9d79846c1fba20a33MD51false10757/653788oai:repositorioacademico.upc.edu.pe:10757/6537882026-02-17 17:49:15.634Repositorio Académico UPCupc@openrepository.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 |
| score |
13.96985 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).