Using cyber threat intelligence as a part of organisational cybersecurity

Kyberuhkatiedustelu on hieman kiistanalainen aihe ammatillisissa ja akateemisissa piireissä. Koska osa-alue on vielä nuori, tutkimus toimivuuden osalta on vielä vähäistä. Julkisuudessa moni kyberhyökkäys on saanut huomiota. Tämä tutkimus selvittää kyberuhkatiedustelun käyttöä osana organisaatioiden...

Full description

Bibliographic Details
Main Author: Matilainen, Juhani
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Master's thesis
Language:eng
Published: 2021
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/76092
_version_ 1826225713449009152
author Matilainen, Juhani
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Matilainen, Juhani Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Matilainen, Juhani Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Matilainen, Juhani
datasource_str_mv jyx
description Kyberuhkatiedustelu on hieman kiistanalainen aihe ammatillisissa ja akateemisissa piireissä. Koska osa-alue on vielä nuori, tutkimus toimivuuden osalta on vielä vähäistä. Julkisuudessa moni kyberhyökkäys on saanut huomiota. Tämä tutkimus selvittää kyberuhkatiedustelun käyttöä osana organisaatioiden kyberpuolustusta. Tutkielma tehtiin laadullisena tutkimuksena, sisällön analyysin keinoin valitsemalla 14 dokumenttia. Näiden dokumenttien ja OODA silmukan pohjalta luotiin viitekehys kyberuhkatiedustelun käyttöön organisaatioissa. Johtopäätöksenä on todettu, että kyberuhkatiedustelu voi tarjota tarvittavaa tietoa, jolla organisaatio voi puolustautua kyberuhkia vastaan. Cyber Threat Intelligence (CTI) has gained public attention at the same time security breaches are publicised in the press. This thesis is conducted as qualitative study to research Cyber Threat Intelligence usage to harder organisations’ cyber defence. Through content analysis, 14 documents were coded and analysed to form a preliminary framework for CTI usability in organisations. This thesis is using known OODA loop as framework to clarify CTI usage in organizations. As qualitative study, one framework was created. For results, CTI can provide much needed addition for organisational cyber security. From strategic to tactical, CTI can enhance cyber defence is properly used.
first_indexed 2021-06-01T20:04:16Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Matilainen, Juhani", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-05-31T16:58:37Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-05-31T16:58:37Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/76092", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kyberuhkatiedustelu on hieman kiistanalainen aihe ammatillisissa ja akateemisissa piireiss\u00e4. Koska osa-alue on viel\u00e4 nuori, tutkimus toimivuuden osalta on viel\u00e4 v\u00e4h\u00e4ist\u00e4. Julkisuudessa moni kyberhy\u00f6kk\u00e4ys on saanut huomiota. T\u00e4m\u00e4 tutkimus selvitt\u00e4\u00e4 kyberuhkatiedustelun k\u00e4ytt\u00f6\u00e4 osana organisaatioiden kyberpuolustusta.\nTutkielma tehtiin laadullisena tutkimuksena, sis\u00e4ll\u00f6n analyysin keinoin valitsemalla 14 dokumenttia. N\u00e4iden dokumenttien ja OODA silmukan pohjalta luotiin viitekehys kyberuhkatiedustelun k\u00e4ytt\u00f6\u00f6n organisaatioissa. Johtop\u00e4\u00e4t\u00f6ksen\u00e4 on todettu, ett\u00e4 kyberuhkatiedustelu voi tarjota tarvittavaa tietoa, jolla organisaatio voi puolustautua kyberuhkia vastaan.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Cyber Threat Intelligence (CTI) has gained public attention at the same time security breaches are publicised in the press. This thesis is conducted as qualitative study to research Cyber Threat Intelligence usage to harder organisations\u2019 cyber defence. Through content analysis, 14 documents were coded and analysed to form a preliminary framework for CTI usability in organisations.\nThis thesis is using known OODA loop as framework to clarify CTI usage in organizations. As qualitative study, one framework was created. For results, CTI can provide much needed addition for organisational cyber security. From strategic to tactical, CTI can enhance cyber defence is properly used.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-05-31T16:58:37Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-05-31T16:58:37Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "55", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "cyber threat intelligence", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "intelligence analysis", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Using cyber threat intelligence as a part of organisational cybersecurity", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202105313334", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tiedustelu", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tilannekuva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "intelligence and reconnaissance", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "situational awareness", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_76092
language eng
last_indexed 2025-02-18T10:54:37Z
main_date 2021-01-01T00:00:00Z
main_date_str 2021
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/db4092f4-f7b9-40da-8d27-559c29cd5b4f\/download","text":"URN:NBN:fi:jyu-202105313334.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2021
record_format qdc
source_str_mv jyx
spellingShingle Matilainen, Juhani Using cyber threat intelligence as a part of organisational cybersecurity cyber threat intelligence intelligence analysis Tietojärjestelmätiede Information Systems Science 601 tiedustelu tilannekuva kyberturvallisuus intelligence and reconnaissance situational awareness cyber security
title Using cyber threat intelligence as a part of organisational cybersecurity
title_full Using cyber threat intelligence as a part of organisational cybersecurity
title_fullStr Using cyber threat intelligence as a part of organisational cybersecurity Using cyber threat intelligence as a part of organisational cybersecurity
title_full_unstemmed Using cyber threat intelligence as a part of organisational cybersecurity Using cyber threat intelligence as a part of organisational cybersecurity
title_short Using cyber threat intelligence as a part of organisational cybersecurity
title_sort using cyber threat intelligence as a part of organisational cybersecurity
title_txtP Using cyber threat intelligence as a part of organisational cybersecurity
topic cyber threat intelligence intelligence analysis Tietojärjestelmätiede Information Systems Science 601 tiedustelu tilannekuva kyberturvallisuus intelligence and reconnaissance situational awareness cyber security
topic_facet 601 Information Systems Science Tietojärjestelmätiede cyber security cyber threat intelligence intelligence analysis intelligence and reconnaissance kyberturvallisuus situational awareness tiedustelu tilannekuva
url https://jyx.jyu.fi/handle/123456789/76092 http://www.urn.fi/URN:NBN:fi:jyu-202105313334
work_keys_str_mv AT matilainenjuhani usingcyberthreatintelligenceasapartoforganisationalcybersecurity