National Cybersecurity Information Sharing Network

National Cybersecurity Information Sharing Network

Introduction 

Information sharing and integration of cyber data is a prerequisite for the protection of critical infrastructure providers. The National Cybersecurity Information Sharing Network (NCSISN) can be considered as a “security exchange” for sensitive cybersecurity information. It provides a secure venue for sharing cyber threat indicators (they identify malicious cyber activity) with trusted partners, experts, and authorities in real time. 

The NCSISN is a national platform which supports integration and cybersecurity information sharing among critical infrastructure providers, including the private sector, to protect their data against breaches, attacks or lost. Also, it provides the ability for cross-sector cybersecurity monitoring of cyber threats, and cooperation between the critical infrastructure stakeholders. 

The new platform will have the main features of data flow, integration, information sharing, and planned to detect cyber threats.  Also, it enables cross-sector security monitoring of cyber threats, and cooperation between the critical infrastructure stakeholders. 

The National Cybersecurity Agency (NCSA) provide a platform that can be used by multiple stakeholders in cybersecurity to implement rules and policies, collaborate with authorities, law enforcement and other stakeholders, share knowledge, monitor, and act against threats. 

Objectives 

Outcome 

Strategic national defence and offense strategies, effective coordination among organizations, and continuous awareness of potential attacks. 

National Information Sharing Network provides: 

  • critical infrastructures with reliable information about cybersecurity risks,  
  • facilitates information exchange among stakeholders,  
  • alerts managers to emerging threats 
  •  promotes cooperation between organizations.  
  • in addition, NISPC organizes training courses for selected groups of users. 

Page Break 

Strategic Layer 

The main goal of the National Cybersecurity Information Sharing Network (NCSISN) is to increase the detection capability of its network members. 

Following sub-goals have also been identified as a driver of the main goal: 

  1. Sharing indicators of compromises (IoCs), 
  2. Collecting shared IoCs sightings, 
  3. Ensuring quality of shared IoCs. 

Desired outcome of the indicators of compromises (IoCs) sharing is a near-real-time information sharing between the network members. The desired outcome will be supported by the implementation of the MISP Threat Sharing (MISP) open-source threat intelligence platform. 

Desired outcome of the collection of raised sightings on shared IoCs is a near-real-time sightings central reporting of all shared IoCs sightings detected on the network to the National Cybersecurity Agency (NSCA). The desired outcome will also be supported by the implementation of the MISP Threat Sharing (MISP) open-source threat intelligence platform. 

Desired outcome of the ensuring quality of shared IoCs is to guaranteethe accuracy and the value of the IoCs and sightings circulating on the network to the network members. The desired outcome will be supported by a quality management process. 

All goals are under the responsibility of the National Cybersecurity Agency (NSCA) team. The NSCA team is composed of: 

  • a security analyst team, composed of experts having capabilities in incident analysis allowing articulation and operationalization of indicators of compromises (IoCs) into the MISP Threat Sharing (MISP) open-source threat intelligence platform, 
  • an IT operation team, composed of experts having IT operation capabilities including operating systems, network components and into MISP management, 
  • a data analytic team, composed in experts having data analytic capabilities to ensure the continual quality management of the network. Analyzed data is composed of shared IoCs attributes and of related sightings. 

NSCA operational excellence is vital to the sustainability of the network and trust into the network by its members. Operation excellence will ensure that the near-real-time sharing of IoCs, and collection of sightings is achieved. Having a secure network is a paradigm of the trust into the network. IoCs and sightings of value are also critical to ensure the long-term collaboration of the members into the network. 

The National Cybersecurity Information Sharing Network (NCSISN), composed of multiple instances of the MISP Threat Sharing (MISP) open-source threat intelligence platform, is managed at the IT operational level by the IT operation department. 

ArchiMate 

Page Break 

Motivation Layer 

A National Cybersecurity Information Sharing Network (NCSISN) needs to be established at the national level to ensure information sharing allowing detection of cyberattacks against national interest like critical infrastructure. 

The purpose of the NCSISN is to create a secure channel for exchange of information concerning cybersecurity incidents. 

The continuous objective of NCISN is to increase the detection capabilities of its network members to reduce the potential consequences of cybersecurity incidents on national interests. 

Stakeholders 

The following stakeholders that represent their interests in the outcome of the network have been identified: 

  • NCSA: National Cybersecurity Agency sponsor of the project. 
  • Critical Infrastructure Operators: Critical infrastructure operators of critical infrastructures designated by law. Critical infrastructure operators are member of the network. 
  • CERTs / CSIRTs: Computer Emergency Response Teams and Computer Security Incident Response Teams. A CERT / CSIRT could be dedicated to a critical infrastructure operator (inhouse or outsourced) or to a sector covering multiple critical infrastructure operators (e.g., a CERT dedicated to the health sector). CERTs / CSIRTs are member of the network. 
  • ISACs: Information Sharing and Analysis Centres provide central resources to gathering information on cyber threats and sharing them. ISAC’s are most of the time dedicated to a specific sector. ISACs are member of the network. 

Drivers 

The following drivers, representing an external or internal condition that motivates the NCSA to define its goals and implement the changes necessary to achieve them, have been identified: 

  • National Security: The national security includes cybersecurity as a component. 
  • National Cybersecurity Strategy (NCS): The NCS has been developed by the government in collaboration with the private sector. The NCS include a strategic point related to the National Cybersecurity Information Sharing Network (NCSISN) and gives the responsibility to develop the NCSISN to the National Cybersecurity Agency (NCSA). 
  • National legislation: The national legislation gives to the National Cybersecurity Agency (NCSA) the mission to protect critical infrastructures and to distribute appropriate information to concerned entities. National legislation also requires from critical infrastructure operators to implement appropriate security measures to ensure national interest. 
  • Geopolitical situations: Some geopolitical situations can increase the risks that the national critical infrastructures could be target of cyber activities or state sponsored hackers. 

Assessment 

As of today, there is no cybersecurity information sharing network that can help to increase detection capabilities of the critical infrastructures. The lack of a cybersecurity information sharing network is a threat to the national interest to protect critical infrastructures and the economy. A national cybersecurity situational view of ongoing cybersecurity attacks and threats is currently not available not allowing effective coordination among impacted organizations, and the promotion of continuous awareness on cyber-attacks. 

Goals 

The main goal is to enhance the national security by increasing in near-real-time detection of cyberattacks and threats capacities targeting critical infrastructures operators supported by an information sharing network. A sub-goal is to provide though the cybersecurity information sharing network a near-real-time national overview of ongoing cybersecurity attacks and threats

Outcomes 

Identified outcomes are: 

  • Implementation of a secure information sharing network. 
  • Sharing of high-quality indicators of compromises (IoCs). 
  • All critical infrastructure operators been members of the network. 
  • All members actively reporting sightings on shared indicators of compromises (IoCs). 
  • Creating a national and sectoral situational view of ongoing cybersecurity attacks and threats. 

Requirements 

The following needs have been identified to achieve a successful National Cybersecurity Information Sharing Network (NCSISN): 

  • Implement a secure network to ensure confidentiality, integrity and availability of exchanged information’s and members. 
  • Ensure quality of shared indicators of compromises (IoCs) to keep stakeholders’ engagement in the network and to ensure that the situational view of ongoing cybersecurity attacks and threats is representative. 

Page Break 

Constraints 

The following constraints that could prevents or obstructs the realisation of the main goal have been identified: 

  • Detection capabilities of critical infrastructure operators doesn’t exist, not allowing to take advantage of shared indicators of compromises (IoCs) and not allowing to National Cybersecurity Agency (NSCA) to collect sightings on these IoCs. 
  • Lack of data analytic resources at the NSCA would not allow NSCA to qualify if IoCs proposed to be shared and sightings reported by the network have value and are not leading to false positives. The situational view of cyber-attacks and threats would also be indirectly impacted by the lack of resources in data analytic expertise. 

Principles 

The following principles are necessary to be implemented: 

  • Adhere to the network confidentiality charter. A confidentiality charter is necessary to be sign by members as sensitive data is shared. 
  • Follow standardized taxonomies for indicators of compromises (IoCs) descriptions. Standardization of IoCs documentation is necessary to ensure coherence and quality of shared information. 

ArchiMate 

Page Break 

Business Layer 

Motivation 

Provide a collaborative infrastructure, that facilitate accurate, complete, timely, and actionable information sharing. This will enable members to mitigate risks proactively and protect themselves from attack. 

Business service 

Information sharing is the main business service offered to the network members. 

Business interfaces 

The MISP Threat Sharing (MISP) open-source threat intelligence platform is the main business interface to the network members. MISP allow sharing of indicators of compromises (IoCs) and of sightings. 

Business processes 

Information sharing  

Information sharing is under the responsibility of the NSCA security analyst team. 

The source of the unqualified information event (composed of indicators of compromises) can be CSIRTs / CERTs, ISACs or critical infrastructure operators that are members of the network and desiring to share the information with other members. These business actors are identified as a role of submitter.  

The destination of the qualified information event (composed of indicators of compromises) can be CSIRTs / CERTs, ISACs or critical infrastructure operators that are members of the network. These business actors are identified as a role of receiver.  

Each unqualified information event submitted by a submitter must be published via the MISP business interface that support the articulation of business processes under the responsibilities of the NSCA security analyst team. 

Each qualified information event validated by the NSCA security analyst team will be published via the MISP business interface to the receiver role. 

The following business processes are under the responsibility of the NSCA security analyst team: 

  • Classification level validation: This process ensures that the proposed indicators have a defined classification traffic light protocol (TLP) level. TLP allow the submitter to specify the confidentiality level required by the receiver. If the TLP level is not specified, the unqualified information event is rejected, and rejection is notified to the submitter with documented reasons. If not rejected in this phase of the process the unqualified information event will have a validation of its model. 
  • Data model validation: This process ensure that the proposed indicators are respecting the MISP data model. If the MISP data model is not respected, the unqualified information event is rejected, and rejection is notified to the submitter with documented reasons. If not rejected in this phase of the process the unqualified information event will have a validation of its taxonomy. 
  • Taxonomy validation: This process ensure that the proposed indicators are respecting the proposed MISP taxonomies allowing classifications modelling. If the proposed MISP taxonomies are not respected, the unqualified information event is rejected, and rejection is notified to the submitter with documented reasons. If not rejected in this phase of the process the unqualified information event will have a validation of its quality with the sandbox validation process. 
  • Sandbox validation: This process ensure that the proposed indicators are not triggering important number of false positives (due to popularity by example) or are not deceptive indicators submitted to pollute the network. If the proposed sandbox validation doesn’t pass, the unqualified information event is rejected, and rejection is notified to the submitter with documented reasons. If not rejected in this phase of the process the unqualified information event will be published to the network members for sharing. 
  • Event rejection: This process is triggered when an unqualified information event is rejected as a rejected information event after the classification level validation, data model validation, the taxonomy validation or the sandbox validation processes. The rejection is notified via the MISP interface to the submitter with a documented reason of rejection. 
  • Event publication: This process consists of publishing a qualified information event to the network members identified as a role of receiver

Data analytic  

Data analytic is under the responsibility of the NSCA data analytic team and is triggered by a planned monthly review of all qualified information events that are shared on the network. 

Data analytic is articulated around the following processes: 

  • Sightings review: This process reviews the quality of the sightings raised on the shared qualified information events to determine if the concerned qualified information events can still be shared on the network or if they should be decommissioned from the network. 
  • Lifetime review: This process ensures that the shared qualified information events lifetime is still accurate. A shared qualified information event that is too old will lose its pertinence despite sightings occurred or not on it. If the concerned qualified information event is too old, it will be decommissioned from the network. 
  • Context review: This process ensures that the shared qualified information events context is still accurate. Following reported sightings, the context could still be accurate or not. If the initial context of the concerned qualified information event is no more accurate, it will be decommissioned from the network. 
  • Event decommission: The process consist to decommission the qualified information event from the network.  The decommission is notified via the MISP interface to the submitter with a documented reason of decommission. 

ArchiMate 

Page Break 

Application Layer 

MISP Threat Sharing (MISP) open-source threat intelligence platform is the main interface used in the project. MISP is developed by a third party. 

Application services: 

  • Submitted unqualified information event. 
  • Collect qualified information event. 
  • Collect rejected unqualified information event. 

Application components: 

  •  

ArchiMate 

Page Break 

Technology Layer 

ArchiMate 

Risk and security 

Conclusion 

Order Now

Get expert help for National Cybersecurity Information Sharing Network and many more. 24X7 help, plag free solution. Order online now!

Universal Assignment (December 25, 2024) National Cybersecurity Information Sharing Network. Retrieved from https://universalassignment.com/national-cybersecurity-information-sharing-network/.
"National Cybersecurity Information Sharing Network." Universal Assignment - December 25, 2024, https://universalassignment.com/national-cybersecurity-information-sharing-network/
Universal Assignment July 28, 2022 National Cybersecurity Information Sharing Network., viewed December 25, 2024,<https://universalassignment.com/national-cybersecurity-information-sharing-network/>
Universal Assignment - National Cybersecurity Information Sharing Network. [Internet]. [Accessed December 25, 2024]. Available from: https://universalassignment.com/national-cybersecurity-information-sharing-network/
"National Cybersecurity Information Sharing Network." Universal Assignment - Accessed December 25, 2024. https://universalassignment.com/national-cybersecurity-information-sharing-network/
"National Cybersecurity Information Sharing Network." Universal Assignment [Online]. Available: https://universalassignment.com/national-cybersecurity-information-sharing-network/. [Accessed: December 25, 2024]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

RES800 Assessment 1 – Research Question and Literature Review

Subject Title Business Research Subject Code RES800 Assessment Title Assessment 1 – Research Question and Literature Review Learning Outcome/s     Utilise critical thinking to analyse managerial problems and formulate relevant research questions and a research design   Apply research theories and methodologies to assist in developing a business research

Read More »

Assessment Task 2 Health advocacy and communication plan

Assessment Task 2 Health advocacy and communication plan Rationale and multimedia plan presentation Submission requirements Due date and time:         Rationale: 8pm AEST Monday 23 September 2024 (Week 11) Multimedia plan presentation: 8pm AEST Monday 30 September 2024 (Study Period) % of final grade:         50% of overall grade Word limit: Time

Read More »

MLI500 Leadership and innovation Assessment 1

Subject Title Leadership and innovation Subject Code MLI500 Assessment Assessment 1: Leadership development plan Individual/Group Individual Length 1500 words Learning Outcomes LO1 Examine the role of leaders in fostering creativity and innovation LO5 Reflect on and take responsibility for their own learning and leadership development processes Submission   Weighting 30%

Read More »

FPC006 Taxation for Financial Planning

Assignment 2 Instructions Assignment marks: 95 | Referencing and presentation: 5 Total marks: 100 Total word limit: 3,000 words Weighting: 40% Download and use the Assignment 2 Answer Template provided in KapLearn to complete your assignment. Your assignment should be loaded into KapLearn by 11.30 pm AEST/AEDT on the wdue

Read More »

TCHR5001 Assessment Brief 1

TCHR5001 Assessment Brief 1 Assessment Details Item Assessment 1: Pitch your pedagogy Type Digital Presentation (Recorded) Due Monday, 16th September 2024, 11:59 pm AEST (start of Week 4) Group type Individual Length 10 minutes (equivalent to 1500 words) Weight 50% Gen AI use Permitted, restrictions apply Aligned ULOS ULO1, ULO2,

Read More »

HSH725 Assessment Task 2

turquoise By changing the Heading 3 above with the following teal, turquoise, orange or pink you can change the colour theme of your CloudFirst CloudDeakin template page. When this page is published the Heading 3 above will be removed, but it will still be here in edit mode if you wish to change the colour theme.

Read More »

Evidence in Health Assessment 2: Evidence Selection

Evidence in Health Assessment 2: Evidence Selection Student name:                                                                    Student ID: Section 1: PICO and search strategy Evidence Question: Insert evidence question from chosen scenario here including all key PICO terms.       PICO Search Terms                                                                                                                                                                                                          Complete the following table.   Subject headings Keywords Synonyms Population  

Read More »

Assessment 1 – Lesson Plan and annotation

ASSESSMENT TASK INFORMATION: XNB390 Assessment 1 – Lesson Plan and annotation This document provides you with information about the requirements for your assessment. Detailed instructions and resources are included for completing the task. The Criterion Reference Assessment (CRA) Marking Matrix that XNB390 markers will use to grade the assessment task

Read More »

XNB390 Task 1 – Professional Lesson Plan

XNB390 Template for Task 1 – Professional Lesson Plan CONTEXT FOR LESSON: SOCIAL JUSTICE CONSIDERATIONS: Equity Diversity Supportive Environment UNIT TITLE:    TERM WEEK DAY TIME 1   5           YEAR/CLASS STUDENT NUMBERS/CONTEXT LOCATION LESSON DURATION         28 Children (chl): 16 boys; 12

Read More »

A2 Critical Review Assignment

YouthSolutions Summary The summary should summarise the key points of the critical review. It should state the aims/purpose of the program and give an overview of the program or strategy you have chosen. This should be 200 words – included in the word count. Critical analysis and evaluation Your critical

Read More »

PUN364 – Workplace activity Assignment

Assessment 1 – DetailsOverviewFor those of you attending the on-campus workshop, you will prepare a report on the simulated simulated inspection below. For those of you who are not attending, you will be required to carry out your own food business inspection under the supervision of a suitably qualified Environmental

Read More »

FPC006 Taxation for Financial Planning

Assignment 1 Instructions Assignment marks: 95 | Referencing and presentation: 5 Total marks: 100 Total word limit: 3,600 words Weighting: 40% Download and use the Assignment 1 Answer Template provided in KapLearn to complete your assignment. Your assignment should be loaded into KapLearn by 11.30 pm AEST/AEDT on the due

Read More »

Mental health Nursing assignment

Due Aug 31 This is based on a Mental health Nursing assignment Used Microsoft word The family genogram is a useful tool for the assessment of individuals, couples, and families.  It can yield significant data and lead to important, new patient understandings and insights as multigenerational patterns take shape and

Read More »

Assessment 2: Research and Policy Review

Length: 2000 words +/- 10% (excluding references)For this assessment, you must choose eight sources (academic readings and policy documents) as the basis of your Research and Policy Review. You must choose your set of sources from the ‘REFERENCES MENU’ on the moodle site, noting the minimum number of sources required

Read More »

HSN702 – Lifespan Nutrition

Assessment Task: 2 Assignment title: Population Nutrition Report and Reflection Assignment task type: Written report, reflection, and short oral presentation Task details The primary focus of this assignment is on population nutrition. Nutritionists play an important role in promoting population health through optimal nutritional intake. You will be asked to

Read More »

Written Assessment 1: Case Study

Billy a 32-year-old male was admitted to the intensive care unit (ICU) with a suspected overdose of tricyclic antidepressants. He is obese (weight 160kg, height 172cm) and has a history of depression and chronic back pain for which he takes oxycodone. On admission to the emergency department, Paramedics were maintaining

Read More »

Assessment Task 8 – Plan and prepare to assess competence

Assessment Task 8 – Plan and prepare to assess competence Assessment Task 8 consists of the following sections: Section 1:      Short answer questions Section 2:      Analyse an assessment tool Section 3:      Determine reasonable adjustment and customisation of assessment process Section 4:      Develop an assessment plan Student Instructions To complete this

Read More »

Nutrition Reviews Assignment 2 – Part A and Part B

This assignment provides you with the opportunity to determine an important research question that is crucial to address based on your reading of one of the two systematic reviews below (Part A). You will then develop a research proposal outlining the study design and methodology needed to answer that question

Read More »

NUR332 – TASK 3 – WRITTEN ASSIGNMENT

NUR332 – TASK 3 – WRITTEN ASSIGNMENT for S2 2024. DESCRIPTION (For this Task 3, the word ‘Indigenous Australians’, refers to the Aboriginal and Torres Strait Islander Peoples of Australia) NUR332 Task 3 – Written Assignment – Due – WEEK 12 – via CANVAS on Wednesday, Midday (1200hrs) 16/10/2024. The

Read More »

NUR100 Task 3 – Case study

NUR100 Task 3 – Case study To identify a key child health issue and discuss this issue in the Australian context. You will demonstrate understanding of contemporary families in Australia. You will discuss the role of the family and reflect on how the family can influence the overall health outcomes

Read More »

NUR 100 Task 2 Health Promotion Poster

NUR 100 Task 2 Health Promotion Poster The weighting for this assessment is 40%. Task instructions You are not permitted to use generative AI tools in this task. Use of AI in this task constitutes student misconduct and is considered contract cheating. This assessment requires you to develop scholarship and

Read More »

BMS 291 Pathophysiology and Pharmacology CASE STUDY

BMS 291 Pathophysiology and Pharmacology CASE STUDY Assessment No: 1 Weighting: 40% Due date Part A: midnight Friday 2nd August 2024 Due date Part B: midnight Sunday 29th September 2024 General information In this assessment, you will develop your skills for analysing, integrating and presenting information for effective evidence-based communication.

Read More »

Assessment Task: Health service delivery

Assessment Task Health service delivery is inherently unpredictable. This unpredictability can arise from, for example, the assortment of patient presentations, environmental factors, changing technologies, shifts in health policy and changes in division leadership. It can also arise from changes in policy within an organisation and/or associated health services that impact

Read More »

LNDN08002 Business Cultures Resit Assessment

LNDN08002 Business Cultures Resit Assessment Briefing 2023–2024 (Resit for Term 1) Contents Before starting this resit, please: 1 Assessment Element 1: Individual Report 1 Case Report Marking Criteria. 3 Assessment Element 2: Continuing Personal Development (CPD) 4 Guidance for Assessment 2: Reflection and Reflective Practice. 5 Student Marking Criteria –

Read More »

Assessment Task 2 – NAPLAN Exercise

Assessment Task 2 (35%) – Evaluation and discussion of test items Assessment Task 2 (35%) – Evaluation and discussion of test items AITSL Standards: This assessmeAITSL Standards: This assessment provides the opportunity to develop evidence that demonstrates these Standards: 1.2        Understand how students learn 1.5        Differentiate teaching to meet with

Read More »

EBY014 Degree Tutor Group 2 Assignment

  Assignment Brief Module Degree Tutor Group 2 Module Code EBY014 Programme BA (Hons) Business and Management with   Foundation Year Academic Year 2024/2025 Issue Date 6th May 2024 Semester Component Magnitude Weighting Deadline Learning outcomes assessed 2 1 2000 words Capstone Assessment 100% 26th July, 2024 1/2/3/4 Module Curriculum

Read More »

NTW 600 Computer Network and Security

Assessment 2 Information and Rubric Subject Code  NTW 600 Subject Name Computer Network and Security Assessment Number and Title Assessment 2: Cyber Security Threats to IT Infrastructure of a real-world Organisation Assessment Type Group Assessment Length / Duration  1500 words Weighting %  30% Project Report: 20% Presentation :10% (Recorded) Total

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?