Please use this identifier to cite or link to this item:
|Title:||Open source cyber incidents intelligence gathering||Authors:||Tiong, Ryan Jun Hua||Keywords:||Engineering::Computer science and engineering||Issue Date:||2021||Publisher:||Nanyang Technological University||Source:||Tiong, R. J. H. (2021). Open source cyber incidents intelligence gathering. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/148089||Abstract:||As Theodore Roosevelt said, “The more you know about the past, the better prepared you are for the future.”. This quote cannot be more true in the realm of predictive analysis. Data about the past can be modelled on variables to explore relationships and predict future outcomes with a degree of probability. As cyber incidents become more prevalent, it is ever necessary for cyber security professionals to quantify the cost of a cyber incident and allocate sufficient budget for remediation and cyber resilience. In order to quantify the cost of a cyber security incident for an organisation, pilot studies have to be done on past cyber security incidents and the respective monetary impacts. Furthermore, without the availability of a cyber security incidents repository, cyber security professionals will spend more manhours sieving through archives to aid their studies each time. The goal of this study is to develop an automated cyber security incidents repository to aid cyber security professionals in the aforementioned aspect. This study utilises multiple libraries to gather information from open-source unstructured and semi-structured data. The repository is supplemented with the profile of the organisation that suffered the cyber security incident, and Advanced Persistent Threat groups that were involved. Based on the resulting repository, future work can be done by cyber security professionals in analysing the correlation between variables of the repository to the settlement costs of the cyber incident, allowing sufficient budget to be allocated for remediation purposes.||URI:||https://hdl.handle.net/10356/148089||DOI (Related Dataset):||10.21979/N9/8OTEZX||Fulltext Permission:||restricted||Fulltext Availability:||With Fulltext|
|Appears in Collections:||SCSE Student Reports (FYP/IA/PA/PI)|
Updated on May 4, 2021
Updated on May 4, 2021
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.