Name: Anamika Tiwari
Email: a.tiwari.8501@westcliff.edu
Department: Department of Business Administration
Affiliation Number: 1
Address: Irvine, CA 92614,USA
A B S T R A C T
The task of making decisions in information security, when faced with unclear probabilities and unforeseen consequences of events in the constantly evolving cyber threat landscape, has gained significant importance. Cyber threat intelligence equips decision-makers with essential information and context to comprehend and predict future threats, hence minimizing ambiguity and enhancing the precision of risk assessments. Addressing uncertainty in decision-making demands the adoption of a new methodology led by threat intelligence (TI) and a risk analysis approach. This is a crucial aspect of evidence-based decision-making. Our proposed solution to this difficulty involves the implementation of a TI-based security assessment methodology and a decision-making strategy that takes into account both known unknowns and unknown unknowns. The proposed methodology seeks to improve decision-making quality by utilizing causal graphs, which provide an alternative to current methodologies that rely on attack trees, hence reducing uncertainty. In addition, we analyze strategies, methods, and protocols that are feasible, likely, and credible, enhancing our capacity to anticipate enemy actions. Our proposed approach offers practical counsel to information security leaders, enabling them to make well-informed decisions in uncertain circumstances. This paper presents a novel approach to tackling the problem of making decisions in uncertain situations in the field of information security. It introduces a methodology that can assist decision-makers in navigating the complexities of the ever-changing and dynamic world of cyber threats.
1. Introduction
The field of information security is undergoing fast changes and now focuses mostly on the concept of managing uncertainty. Risk refers to a possible occurrence that can be recognized and measured, with its probability and consequences able to be assessed (Das et al., 2024). It can be effectively managed by introducing controls and mitigation methods that decrease the probability or consequences of its occurrence. Organizations can utilize risk management frameworks, such as ISO 27005 or NIST CSF, to identify, evaluate, and mitigate risks. These frameworks help organizations make informed decisions on how to allocate resources for risk management (Dekker & Alevizos, 2024). These frameworks encompass holistic methods for managing risks and consist of essential elements such as risk identification, risk assessment, risk treatment, and risk monitoring and review. Risk assessment, particularly risk calculation, is a crucial component of these frameworks as decision-makers rely on the results to guide the risk treatment process and allocate resources (Minkevics & Kampars, 2021; Muckin & Fitch, 2014). As a result, the difficulty of estimating risk is simplified to a familiar financial costbenefit dilemma, where the expense of mitigating the risk is compared to the value of reducing the damage (El Amin et al., 2024).
Uncertainty refers to the condition of being unable to forecast or assess the probability or consequences of an event. Put simply, the probability distribution of both likelihood and impact is uncertain. Uncertainty emerges due to a lack of information or when the given information is partial or confusing (Wu, 2024). Consequently, managing uncertainty becomes a tough undertaking. Uncertainty is a fundamental element of managing cyber risks, and it can greatly affect the assessment of cyber security controls in risk evaluation (Habbal et al., 2024). As a result, it will have an effect on decision-making, specifically in the allocation of resources and the level of trust in security controls. This is true in numerous fields, but it is particularly significant in the realm of security, where, as a result of agency problems, security dangers are frequently either overestimated or underestimated by individuals who lack specialized knowledge (Webb et al., 2013). Given this differentiation, it is crucial for firms to possess diverse techniques to effectively handle each one. Prior studies on the management of cyber hazards and decision-making have predominantly concentrated on comprehending the consequences of cyber attacks, methods of averting them, and the overarching risk management procedure (Webb et al., 2014).
Organizations must prioritize the development and implementation of robust cyber risk management strategies that are in line with contemporary risk analysis methodologies that take into account uncertainty (Jangampeta & Makani, 2024; Kolluri & OF). This study investigates the current orientations of risk assessment analysis and introduces a methodical and rigorous approach based on threat intelligence (TI). The technique builds upon existing notions but acknowledges uncertainty as a fundamental element, thereby aligning with the contemporary understanding of risk (Roberts & Brown, 2017). Three Decision-makers are provided with information to effectively navigate through uncertainty and make adjustments to their cyber defenses depending on the current threat landscape and the effectiveness of their IT landscapespecific security controls (Kreutz & Jahankhani, 2024). The main impetus for this study arises from the growing significance of making decisions in the presence of uncertainty in the realm of information security. Decisionmakers encounter uncertain probabilities and impacts of events in the dynamic and constantly changing cyber threat ecosystem, which poses challenges for risk analysis and mitigation. The incorporation of uncertainty within the ISO standards highlights the necessity for enterprises to modify their risk management practices (Sontan & Samuel, 2024). Prior studies have primarily focused on comprehending cyber-attacks and managing risks but have given little consideration to directly resolving uncertainty (Aditto et al., 2023; Kabbo et al., 2023; Sobuz et al., 2024). Hence, this paper aims to bridge this deficiency by presenting a methodology driven by cyber threat intelligence (CTI) that recognizes and tackles uncertainty. It offers practical advice for information security leaders to navigate the intricacies of the changing cyber threats and make well-informed decisions in uncertain circumstances.
Fig. 1. Key elements of TIBSA at a strategic level
2. Research methodology
This section provides an overview of the TIBSA, a methodology that aims to achieve two primary goals: promote interoperability among different IT, security, and other capabilities, and assist decision-makers in constructing robust cyber defenses in both predictable and unpredictable circumstances. TIBSA can be executed in its whole form, or there is also a quick version of TIBSA available. This means that the amount of strictness used in TIBSAs can be adjusted to a higher or lower level as needed (Webb et al., 2016). When specifically addressing known unknowns, such as when the probability distribution of TTPs (Tactics, Techniques, and Procedures) can be determined, these can be categorized as risks. Consequently, many standard analysis methodologies, such rapid-TIBSA, can be utilized. However, in situations when there are unknown unknowns and consequently ambiguity, such as when the probability distribution of TTPs is not known, the key features of TIBSA (refer to Figure 1) will assist in achieving much improved outcomes, leading to superior decision-making.
2.1. Process of decision making
TIBSA empowers decision-makers to detect, rank, and
address cyber threats by assessing the efficiency of security
measures and their execution, ultimately decreasing
vulnerability to cyber attacks. Various functionalities can be
enhanced through technical or administrative adjustments in
order to prevent or identify certain issues. Efficient security
measures do not necessarily require additional security
controls, and the presence of more security controls does not
automatically guarantee effective defense. An organization's
effectiveness in defense ultimately relies on its capacity to
deliver the appropriate quantity and caliber of information to
decision-makers. Figure 1 illustrates the fundamental
elements of the TIBSA technique, which will be further
examined in the following section.
2.2. Cyber threats for information security system
The first phase in TIBSA involves the use of high-quality,
evidence-based knowledge, including information about
threat context, indicators, implications, mechanisms,
behaviors, and action-oriented guidance provided by TI. To
clarify, comprehending the cyber threat landscape
necessitates the presence of a well-developed and advanced
Cyber Threat Intelligence (CTI) system that operates
effectively at strategic, operational, and tactical levels. This
enables the gathering, manipulation, and examination of data
to comprehend the objectives, motivations, targets, trends,
behaviors, and attribution of the threat source.35 CTI serves
as a facilitator for making well-informed security decisions
based on data, making it the initial and essential step to
initiate the TIBSA. Currently, CTI is being applied in several
scenarios. For instance, it provides C-level executives with
valuable information that can assist in making quicker and
2.3. Utilize the scoring model
TIBSA's design necessitates and requires attentive activities.
However, it is important to note that different organizations
may possess varying resources, aims, mission, and vision.
Some businesses may choose to conduct a comprehensive
evaluation of all relevant security measures against potential,
likely, and possible tactics, techniques, and procedures
(TTPs) by implementing a full-scale Threat IntelligenceBased Security Assessment (TIBSA). However, other
organizations may prefer a more condensed version known as
rapid-TIBSA. Irrespective of the selected TIBSA version,
implementing a scoring model is an essential step in
prioritizing the coverage of TTPs. Scoring models can be
implemented using several techniques. For example, a
scoring model produces impressive outcomes when
implemented using the most basic method, spreadsheets.
Alternatively, it can be integrated into an AI-powered system
to enhance user-friendliness, streamline processes, perhaps
decrease reliance on highly skilled professionals, mitigate
subjectivity, or even minimize prejudice. It is recommended
to personalize and execute the model in an automated manner more effective decisions. Additionally, it illuminates potential
dangers that are specific to the organization, allowing security
teams to make more informed decisions. This includes
enhancing security measures by prioritizing the resolution of
vulnerabilities and fine-tuning prevention and detection
systems. In addition, the strategic and tactical level
capabilities of CTI enhance other security capabilities by
uncovering enemy objectives, reasons, characteristics,
methods of operation, and specific tactics, techniques, and
procedures (TTPs) 36, and conducting thorough threat
research. The purpose of this paragraph is not to extensively
analyze CTI's role and details in the cyber domain. However,
it is essential to establish CTI as the guiding force for TIBSA
by consistently monitoring and analyzing the cyber threat
landscape across all strategic, operational, and tactical aspects.
Therefore, it is crucial for CTI to deliver practical, fact-based
information on possible threats, their objectives, and/or their
tactics, techniques, and procedures (TTPs) for TIBSA to
begin.
3. Evaluate the security measures
TIBSA is specifically intended to ensure seamless
compatibility and cooperation between different systems. It
promotes collaboration across security capabilities,
regardless of their placement within an organization. For
instance, the ability to collaborate across different divisions
can be utilized to create virtual teams that are assigned to
achieve a common objective. This enables the elimination of
potential barriers between divisions. This, in turn, not only
enhances collaboration but also facilitates the consolidation
of diverse expert ideas, resulting in greatly enhanced and, to
the greatest extent feasible, unbiased judgments. It is crucial
to allocate the most suitable capability to assess the efficiency
of a security control, in line with the Tactics, Techniques, and
Procedures (TTPs). Assessors may be assigned to evaluate
controls through technical workshops and interviews, while
controls requiring thorough technical validation may be allocated to technically proficient professionals like
penetration testers. TIBSA could potentially collaborate with
threat-intelligence based ethical red teaming (TIBER) for
control assessment, resulting in a significant impact. As
outlined in the TIBER-EU framework, TIBER 44 conducts a
capture the flag exercise that is led by threat intelligence.
Therefore, TIBSA may incorporate TIBER as a precise
This is the first task that needs to be completed in this step.
The level of effectiveness can vary in granularity, and it is the
responsibility of companies to establish their own based on
their own needs and maturity levels. Table 1 is an illustration
of the efficacy scale in comparison to pre-established criteria.
TIBSA employs a set of two-letter notations, influenced by
Reference 45 and based on the criteria of prevention,
detection, constraint, and recovery, to streamline and expedite
the execution of this task. The third letter (L, M, and H)
indicates the level of effectiveness. For instance, certain
controls may be extremely efficient in preventing a TTP
(threat to process) but offer little to no value in terms of
recovery. Some may have a high level of effectiveness in
detecting Tactics, Techniques, and Procedures (TTPs) and a
moderate level of effectiveness in limiting or restricting a TTP.
The purpose of this stage is to thoroughly evaluate and
determine the efficiency of the security controls currently
being used against a variety of feasible, probable, and
plausible Tactics, Techniques, and Procedures (TTPs). TIBSA
assessment for various Tactics, Techniques, and Procedures
(TTPs). Conversely, TIBER has the potential to stimulate
more extensive ecosystem-driven TIBSAs. To ensure
successful collaboration and clearly defined job distribution,
it is essential to create a mapping of controls comparing the
use of a third-party provider (TTP) vs in-house controls . employs a straightforward and efficient method to determine
the efficacy evaluation of a control that is currently in use,
using the principles of benefit-cost analysis (BCA). The
number is 46. A linear scale ranging from 1 to 12 is allocated,
as seen in Table 1. It is important to mention that the score
falls in a left-to-right direction, with the left side indicating
that prevention controls are intrinsically valued higher than
recovery controls. Consequently, prioritizing prevention
strategies would be preferred above reactive and recovery
strategies. However, this can still be modified based on the
specific needs of the company. To determine the initial
component, the benefit, it is necessary to add up the scores
corresponding to the range of attenuated TTPs as indicated in
Table 1. Table 2 presents a comprehensive overview of the
effectiveness of in-use controls in mitigating a range of TTPs.
The controls are arranged in descending order according on
their benefit-to-cost ratio.
3.1. Uncertainty to risk strategy
First and first, it is necessary to provide a clear definition of
the phrases "known unknown" and "unknown unknown"
within the specific context being discussed. A known
unknown refers to a circumstance in which the occurrence of
an event is acknowledged, but the precise details and the
probability distribution of this event remain uncertain. An
"unknown unknown" refers to a circumstance when both the
occurrence and the probability distribution are unknown.
TIBSA initiates the process by acquiring knowledge that is
supported by evidence through CTI. Strategic-level Cyber
Threat Intelligence (CTI) serves a vital role in conducting an
analysis of the uncertainties of the threat landscape. The input
given could potentially indicate a threat that includes Tactics,
Techniques, and Procedures (TTPs), or it could be a targeted
and sophisticated attack known as an Advanced Persistent
Threat (APT) campaign, with distinct TTPs employed during
each step of the attack. On the other hand, reliable and wellfounded CTI may assign a probability distribution to threats
by doing a thorough analysis. This allows for the
transformation of these threat events from being completely
unknown to being partially known. To clarify, we need to
move those instances of potential harm into the realm of risk.
That is because we have information indicating that a
malicious actor is focusing on a particular sector of
businesses. We are aware of their methods and tactics, which
allows us to determine the probability distribution of their
actions. It is important to consider the Ellsberg dilemma in
this context.
4. Conclusions
This study presents a versatile and pragmatic analysis method
driven by TI (technology integration), which takes into
account uncertainty and enhances decision-making. By
integrating uncertainty into assessment analysis, particularly
in the evaluation of cybersecurity control efficacy, chief
information security officers (CISOs) can enhance their
decision-making about resource allocation and strategies to
mitigate cyber threats. By assessing the level of uncertainty
surrounding various risks and controls, Chief Information
Security Officers (CISOs) can gain a clearer understanding of
the potential consequences of different risks and the efficacy
of current measures in reducing those risks. This can assist in
guaranteeing that resources are distributed efficiently and
effectively according to the organization's requirements and
that the organization's security position remains consistently
appropriate for the evolving threat landscape. Decisionmakers can potentially prevent excessive expenditure by
employing a cost-benefit approach, as suggested, to discover
the most economically efficient measures for reducing the
identified risks. Consequently, this offers reliable data and
practical knowledge to Chief Information Security Officers
(CISOs) in order to prevent the typical mistake of placing too
much or too little trust in security controls. As a result, they
may refine their security defenses.
In addition, the utilization of AI and machine learning (ML)
to create automated tools and methodologies would greatly
enhance the implementation of TIBSA in real-world situations, resulting in improved efficiency, scalability, and
accuracy. Artificial intelligence (AI) and machine learning
(ML) algorithms have demonstrated significant potential in
the analysis of extensive datasets, the identification of
patterns, and the generation of predictions. By incorporating
artificial intelligence (AI) and machine learning (ML)
functionalities, such as Bayesian inference, into the TIBSA
approach, it becomes feasible to automate specific processes,
including data gathering, threat analysis, and uncertainty
modeling. Finally, it is essential to incorporate TIBSA into
current risk management frameworks and standards in order
to establish a comprehensive methodology for analyzing and
managing risks. Further investigation is needed to examine
the compatibility and potential collaboration between TIBSA
and frameworks like the NIST CSF v2 or ISO 27001/27005.
Integrating TIBSA can improve the compatibility and
implementation of TIBSA within enterprises.
References
Aditto, F. S., Sobuz, M. H. R., Saha, A., Jabin, J. A., Kabbo, M. K.
I., Hasan, N. M. S., & Islam, S. (2023). Fresh, mechanical and
microstructural behaviour of high-strength self-compacting
concrete using supplementary cementitious materials. Case
Studies in Construction Materials, 19, e02395.
Das, P.,
Gupta, I., & Mishra, S. (2024). Artificial intelligence driven
cybersecurity in digital healthcare frameworks. In Securing
Next-Generation Connected Healthcare Systems (pp. 213-
228). Elsevier.
Dekker, M., & Alevizos, L. (2024).
A threat‐intelligence driven
methodology to incorporate uncertainty in cyber risk analysis
and enhance decision‐making.
Security and Privacy, 7(1),
e333.
El Amin, H., Samhat, A. E., Chamoun, M., Oueidat, L., & Feghali,
A. (2024). An Integrated Approach to Cyber Risk
Management with Cyber Threat Intelligence Framework to
Secure Critical Infrastructure. Journal of Cybersecurity and
Privacy, 4(2), 357-381.
Habbal, A., Ali, M. K., & Abuzaraida, M. A. (2024). Artificial
Intelligence Trust, risk and security management (AI trism):
Frameworks, applications, challenges and future research
directions. Expert Systems with Applications, 240, 122442.
Jangampeta, S., & Makani, S. T. (2024). The Future of Threat
Intelligence-Driven Security: Integrating Emerging
Technologies for Enhanced Decision-Making. Journal ID,
9471, 1297.
Kabbo, M., Sobuz, M., & Khan, M. (2023).Combined influence of
Waste Marble Powder and Silica Fume on the Mechanical
Properties f Structural Cellular Lightweight Concrete.
International Conference on Planning, Architecture & Civil
Engineering.
Kolluri, V., & OF, A. E. I. I. G. THE DIGITAL REALM: AI-DRIVEN
ANTIVIRUS AND CYBER THREAT INTELLIGENCE‖.
Kreutz, H., & Jahankhani, H. (2024). Impact of Artificial
Intelligence on Enterprise Information Security Management
in the Context of ISO 27001 and 27002: A Tertiary Systematic
Review and Comparative Analysis. Cybersecurity and .
Artificial Intelligence: Transformational Strategies and
Disruptive Innovation, 1-34.
Minkevics, V., & Kampars, J. (2021). Artificial intelligence and big
data driven IS security management solution with applications
in higher education organizations. 2021 17th International
Conference on Network and Service Management (CNSM),
Muckin, M., & Fitch, S. C. (2014). A threat-driven approach to cyber
security. Lockheed Martin Corporation.
Roberts, S. J., & Brown, R. (2017).
Intelligence-driven incident
response: Outwitting the adversary. " O'Reilly Media, Inc.".
Sobuz, M. H. R., Khan, M. H., Kabbo, M. K. I., Alhamami, A. H.,
Aditto, F. S., Sajib, M. S., Alengaram, U. J., Mansour, W.,
Hasan, N. M. S., & Datta, S. D. (2024). Assessment of
mechanical properties with machine learning modeling and
durability, and microstructural characteristics of a biocharcement mortar composite. Construction and Building
Materials, 411, 134281.
Sontan, A. D., & Samuel, S. V. (2024). The intersection of Artificial
Intelligence and cybersecurity: Challenges and opportunities.
World Journal of Advanced Research and Reviews, 21(2),
1720-1736.
Webb, J., Ahmad, A., Maynard, S., & Shanks, G. (2016).
Foundations for an intelligence-driven information security
risk-management system. Journal of Information Technology
Theory and Application (JITTA), 17(3), 3.
Webb, J., Maynard, S., Ahmad, A., & Shanks, G. (2013).
Towards
an intelligence-driven information security risk management
process for organisations.
Webb, J., Maynard, S., Ahmad, A., & Shanks, G. (2014).
Information security risk management: An intelligence-driven
approach. Australasian Journal of Information Systems, 18(3).
Wu, H. (2024). Security Situation Awareness System Based on
Artificial Intelligence. Scalable Computing: Practice and
Experience, 25(3), 1301-1310.