Shadow Cyber Threat Intelligence and Its Use in Information Security and Risk Management Processes.
Clemens SauerweinChristian SillaberRuth BreuPublished in: MKWI (2018)
Keyphrases
- information security
- risk management
- information security management
- countermeasures
- risk assessment
- cyber defense
- cyber crime
- risk analysis
- cyber security
- smart grid
- security issues
- decision support system
- risk evaluation
- information systems
- smart card
- critical infrastructure
- intrusion detection
- network security
- operational risk
- information assurance
- artificial intelligence
- security level
- commercial banks
- risk factors
- project management
- financial institutions
- security requirements
- security management
- credit risk
- cyber attacks
- databases
- data model
- data analysis
- data mining