Cyber Threat Intelligence Sharing: A Review of Concepts, Platforms, and Legal Considerations

Authors

  • Clement Amone Keyamo Department of Computer Science, Dennis Osadebay University, Asaba, Nigeria
  • Obiageli Modupe Attoh Department of Cyber Security, Dennis Osadebay University, Asaba, Nigeria
  • Ogechi Peace EDUN Department of Cyber Security, Dennis Osadebay University, Asaba, Nigeria
  • Abosede Esther Adeoye Department of Computer Science, Dennis Osadebay University, Asaba, Nigeria
  • Nwanze Chukwudi Ashioba Department of Computer Science, Dennis Osadebay University, Asaba, Nigeria
  • Rume Elizabeth Yoro Department of Cyber Security, Dennis Osadebay University, Asaba, Nigeria

Keywords:

Cyber Threat Intelligence, CTI sharing infrastructure, Threat Intelligence Platforms, Open Source Intelligence (OSINT)

Abstract

There is a need for a collaboration-based response to check sophisticated attacks on computer-based systems by Cyber criminals through the sharing of relevant information between related targets of these criminals. The sharing of such information is referred to as Cyber Threat Intelligence sharing. This paper aims to introduce useful information to practising stakeholders and their organizations that can assist and convince their participation in Cyber Intelligence Sharing activities. The Rapid Literature Review (RLR) method is used to gather relevant data to answer key research questions including: What is Cyber Threat Intelligence? What are the terminologies and concepts that help to understand Cyber Threat Intelligence and the sharing of same? How is Cyber Threat Intelligence shared and what technology is used for sharing? And what are the legal matters arising in the sharing of Cyber Threat Intelligence? The paper focuses on defining key terminologies and concepts in the area, introducing Threat Intelligence Platforms used in sharing relevant information and explaining some legal matters arising from sharing Cyber Intelligence.

Downloads

Published

2024-09-30

How to Cite

Keyamo, C. . A., Attoh, O. M., EDUN, O. P., Adeoye, A. E., Ashioba, N. C., & Yoro, R. E. (2024). Cyber Threat Intelligence Sharing: A Review of Concepts, Platforms, and Legal Considerations. Faculty of Natural and Applied Sciences Journal of Computing and Applications, 2(1), 58–65. Retrieved from https://fnasjournals.com/index.php/FNAS-JCA/article/view/499