Journal of Computer Networks
ISSN (Print): 2372-4749 ISSN (Online): 2372-4757 Website: https://www.sciepub.com/journal/jcn Editor-in-chief: Sergii Kavun, Naima kaabouch
Open Access
Journal Browser
Go
Journal of Computer Networks. 2024, 12(1), 1-6
DOI: 10.12691/jcn-12-1-1
Open AccessArticle

Cybersecurity Data Sources and Practices

Cheryl Ann Alexander1, and Lidong Wang2

1Institute for IT Innovation and Smart Health, Mississippi, USA

2Institute for Systems Engineering Research, Mississippi State University, Mississippi, USA

Pub. Date: August 12, 2024

Cite this paper:
Cheryl Ann Alexander and Lidong Wang. Cybersecurity Data Sources and Practices. Journal of Computer Networks. 2024; 12(1):1-6. doi: 10.12691/jcn-12-1-1

Abstract

Today, with technology exploding in every organization, massive amounts of data are being generated, thus, approaches to processing such huge amounts of data are necessary and key to threat detection and cybersecurity. Currently, artificial intelligence (AI)/machine learning (ML), and cyber automation help to process these huge amounts of data, however, much of the data is unstructured and unlabeled and can be a considerable challenge for off-the-shelf AI/ML. This paper introduces cybersecurity data sources; the functions, features, limitations, and future trends of security information and event management (SIEM); potential enhancements of future SIEM; offense data and defense data; and data sources and AI for SIEM. Cybersecurity data sources and practices are also discussed in a large medical center as a case study. Data sources in healthcare can be internal or external. Offensive and defensive strategies must include where the data comes from and how the data is used. A future enhancement of SIEM is beneficial such as improving prediction, detection, correlation, and reaction capabilities. Networks are the platform of cyber data sources and practices (such as data storage and transfer), networked medical equipment, health monitoring, SIEM, and even malicious attacks. A key to robust cybersecurity is to enhance the security of computer networks.

Keywords:
cybersecurity network offense data defense data Internet of things (IoT) Internet of medical things (IoMT) artificial intelligence (AI) machine learning (ML) healthcare

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  González-Granadillo, G., González-Zarzosa, S., & Diaz, R. (2021). Security information and event management (SIEM): analysis, trends, and usage in critical infrastructures. Sensors, 21(14), 4759.
 
[2]  National Institute of Standards and Technology. (2015). Guide to industrial control systems (ICS) security- NIST special publication 800-82, revision 2. https:// nvlpubs.nist.gov/ nistpubs/ SpecialPublications/ NIST.SP.800-82r2.pdf.
 
[3]  Bowman, B., & Huang, H. H. (2021). Towards next-generation cybersecurity with graph ai. ACM SIGOPS Operating Systems Review, 55(1), 61-67.
 
[4]  Mtsweni, J., & Mutemwa, M. (2019, July). Technical guidelines for evaluating and selecting data sources for cybersecurity threat intelligence. In Proceedings of the ECCWS 2019 18th European Conference on Cyber Warfare and Security (pp. 305-313).
 
[5]  Biddle, S. (2017). Why SIEM solutions are essential to securing healthcare networks. Fortinet Article.
 
[6]  O’Dowd, E. (2016). How SIEM solutions work to secure health IT infrastructure. HIT Infrastructure, Xtelligent Healthcare Media Report.
 
[7]  Hollister, A. (2021). Similarities and differences between XDR and SIEM. Forbes Technology Council Post.
 
[8]  Serckumecka, A., Medeiros, I., Ferreira, B., & Bessani, A. (2019). A cost-effective cloud event archival for SIEMs. In 2019 38th International Symposium on Reliable Distributed Systems Workshops (SRDSW) (pp. 31-36). IEEE.
 
[9]  Tankard, C. (2019). Goodbye SIEM, Hello SOARX. Network Security.
 
[10]  Vazao, A., Santos, L., Oliveira, A., & Rabadao, C. (2021, June). A GDPR compliant siem solution. In European Conference on Cyber Warfare and Security (pp. 440-XIV). Academic Conferences International Limited.
 
[11]  Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (GDPR). A Practical Guide, 1st Ed., Cham: Springer International Publishing, 10(3152676), 10-5555.
 
[12]  Ajmal, A. B., Shah, M. A., Maple, C., Asghar, M. N., & Islam, S. U. (2021). Offensive security: Towards proactive threat hunting via adversary emulation. IEEE Access, 9, 126023-126033.
 
[13]  DalleMule, L., & Davenport, T. H. (2017). What’s your data strategy. Harvard business review, 95(3), 112-121.
 
[14]  Waltz, E. (2000, June). Data fusion in offensive and defensive information operations. In NSSDF Symposium.
 
[15]  Samtani, S., Kantarcioglu, M., & Chen, H. (2020). Trailblazing the artificial intelligence for cybersecurity discipline: a multi-disciplinary research roadmap. ACM Transactions on Management Information Systems (TMIS), 11(4), 1-19.