Cyber Information-Sharing Models: An Overview

Because similar cyber attack methods are often used against a wide range of targets, it is crucial for organizations to share information on the tools, techniques and resources adversaries are using.

Download Resources

PDF Accessibility

One or more of the PDF files on this page fall under E202.2 Legacy Exceptions and may not be completely accessible. You may request an accessible version of a PDF using the form on the Contact Us page.

Cyber security is often expensive and the costs of intrusions can be exceedingly high. Thus, there can be a massive gain in return-on-investment by leveraging work done by others. Information sharing between organizations can enable participants to develop tailored strategies for layering defenses across different steps of the kill chain. This paper discusses the advantages and disadvantages of sharing different types of information.