Please use this identifier to cite or link to this item: http://hdl.handle.net/10125/60152

How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations

File Size Format  
0712.pdf 412.11 kB Adobe PDF View/Open

Item Summary

Title:How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations
Authors:Grispos, George
Glisson, William
Storer, Tim
Keywords:Cyber Threat Intelligence and Analytics
Software Technology
Case Study
Data Quality
Incident Learning
show 2 moreSecurity Incident Response
Threat Intelligence
show less
Date Issued:08 Jan 2019
Abstract:An increasing number of cybersecurity incidents prompts organizations to explore alternative security solutions, such as threat intelligence programs. For such programs to succeed, data needs to be collected, validated, and recorded in relevant datastores. One potential source supplying these datastores is an organization’s security incident response team. However, researchers have argued that these teams focus more on eradication and recovery and less on providing feedback to enhance organizational security. This prompts the idea that data collected during security incident investigations may be of insufficient quality for threat intelligence analysis.
While previous discussions focus on data quality issues from threat intelligence sharing perspectives, minimal research examines the data generated during incident response investigations. This paper presents the results of a case study identifying data quality challenges in a Fortune 500 organization’s incident response team. Furthermore, the paper provides the foundation for future research regarding data quality concerns in security incident response.
Pages/Duration:10 pages
URI:http://hdl.handle.net/10125/60152
ISBN:978-0-9981331-2-6
DOI:10.24251/HICSS.2019.859
Rights:Attribution-NonCommercial-NoDerivatives 4.0 International
https://creativecommons.org/licenses/by-nc-nd/4.0/
Appears in Collections: Cyber Threat Intelligence and Analytics


Please email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons