A Study on the Information Exchange Management System for Nationwide Cyber Threat Intelligence
- Affiliation
- 부경대학교 대학원
- Department
- 대학원 정보시스템협동과정
- Advisor
- 박만곤
- Table Of Contents
- Chapter 1. Introduction 11
1.1 Background 11
1.2 Purpose and Structure of the Thesis 13
Chapter 2. Overview of CTI Information Exchange 15
2.1 APT vs CTI 15
2.2 Cyber Threat Intelligence 17
2.2.1 The Intelligence Lifecycle 17
2.2.2 Areas of Intelligence 19
2.2.3 Cyber Threat Intelligence Information 20
2.3 Cyber Threat Intelligence Information Exchange 21
2.3.1 Benefits and Challenges of CTI Information Sharing 22
2.3.2 CTI Information Exchange Topology 23
2.3.3 Data Standards in CTI Information Exchange 24
Chapter 3. Establishing a Nationwide CTI Information Exchange 27
3.1 Define the Goals and Objectives 27
3.2 Identifying the Required Cyber Policy, Regulation, and Legislation 28
3.3 Identifying the National CTI Actors 28
3.4 Handling different types of Standards 30
3.5 Handling Trust and Security 31
3.6 Joining an Intelligence Community 32
3.7 A Nationwide CTI Information Exchange Model 33
Chapter 4. Information Exchange Management System for Nationwide CTI Business Process Modeling 35
4.1 Business Process Modeling the Nationwide CTI Information Exchange Information System 35
4.1.1 Overview of IDEF0 36
4.1.2 The Context Diagram 36
4.1.3 Node Tree 38
4.1.4 Activity Hierarchy (Decomposition of IDEF0) 38
4.2 Context Diagram of the Nationwide CTI Information Exchange System 39
4.2.1 Identifying the Inputs 40
4.2.2 Identifying the Controls 41
4.2.3 Identifying the Mechanism 42
4.2.4 Identifying the Outputs 44
4.2.5 The Context Diagram 44
4.3 Node Tree Diagram and the A0 Diagram of the Nationwide CTI Information Exchange Management System 45
4.4 Decomposing the Activities 47
4.4.1 Decomposing the CTI Planning Activity (A1) 48
4.4.2 Decomposing the CTI Collecting Activity (A2) 51
4.4.3 Decomposing the CTI Processing Activity (A3) 52
4.4.4 Decomposing the National CTI Analysis Activity (A4) 55
4.4.5 Decomposing the Quality Checking and Acceptance Activity (A5) 58
4.4.6 Decomposing the Intelligence Dissemination Activity (A.6) 60
Chapter 5. Conclusion and Future Works 62
5.1 Conclusion 62
5.2 Future Works 63
References 64
Acknowledgements 68
- Degree
- Master
-
Appears in Collections:
- 대학원 > 정보시스템협동과정
- Authorize & License
-
- Files in This Item:
-
Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.