The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration Systems (LAS). LAS services involve requests and responses concerning public and private cadastral data, including credentials of parties, ownership, and spatial parcels. This study explores the integration of CTI in LAS to enhance cyber resilience, focusing on the unique vulnerabilities of LAS, such as sensitive data management and interconnection with other critical systems related to spatial data uses and changes. The approach employs a case study of a typical country-specific LAS to analyse structured vulnerabilities and their attributes to determine the degree of vulnerability of LAS through a quantitative inductive approach. The analysis results indicate significant improvements in identifying and mitigating potential threats through CTI integration, thus enhancing cyber resilience. These findings are crucial for policymakers and practitioners to develop robust cybersecurity strategies for LAS.
References
[1]
United Nations (2022) United Nations Economic Commission for Europe Scenario Study on Future Land Administration in the UNECE Region.
[2]
FAO, UNECE, FIG, Bennett, R., Stöcker, C. and Asiama, K. (2022) Digital Transformation and Land Administration. FAO, UNECE (United Nations Economic Commission for Europe).
[3]
Saeed, S., Suayyid, S.A., Al-Ghamdi, M.S., Al-Muhaisen, H. and Almuhaideb, A.M. (2023) A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. Sensors, 23, Article 7273. https://doi.org/10.3390/s23167273
[4]
Sahrom Abu, M., Rahayu Selamat, S., Ariffin, A. and Yusof, R. (2018) Cyber Threat Intelligence—Issue and Challenges. Indonesian Journal of Electrical Engineering and Computer Science, 10, 371-379. https://doi.org/10.11591/ijeecs.v10.i1.pp371-379
[5]
Salvi, A., Spagnoletti, P. and Noori, N.S. (2022) Cyber-Resilience of Critical Cyber Infrastructures: Integrating Digital Twins in the Electric Power Ecosystem. Computers & Security, 112, Article ID: 102507. https://doi.org/10.1016/j.cose.2021.102507
[6]
Samtani, S., Zhao, Z. and Krishnan, R. (2023) Secure Knowledge Management and Cybersecurity in the Era of Artificial Intelligence. Information Systems Frontiers, 25, 425-429. https://doi.org/10.1007/s10796-023-10372-y
[7]
Berady, A., Tong, V.V.T., Guette, G. and Jaume, M. (2021) Caractérisation Tactique d’un Attaquant Évoluant Dans Un Réseau Compromis. Journéethématique du GT SSLR. https://gtsslr21-reseau.sciencesconf.org/353075
[8]
Alaeifar, P., Pal, S., Jadidi, Z., Hussain, M. and Foo, E. (2024) Current Approaches and Future Directions for Cyber Threat Intelligence Sharing: A Survey. Journal of Information Security and Applications, 83, Article ID: 103786. https://doi.org/10.1016/j.jisa.2024.103786
[9]
Aljuhami, A.M. and Bamasoud, D.M. (2021) Cyber Threat Intelligence in Risk Management. International Journal of Advanced Computer Science and Applications, 12, 156-164. https://doi.org/10.14569/ijacsa.2021.0121018
[10]
Saxena, R. and Gayathri, E. (2022) Cyber Threat Intelligence Challenges: Leveraging Blockchain Intelligence with Possible Solution. Materials Today: Proceedings, 51, 682-689. https://doi.org/10.1016/j.matpr.2021.06.204
[11]
Li, J. (2018) Cyber Security Meets Artificial Intelligence: A Survey. Frontiers of Information Technology & Electronic Engineering, 19, 1462-1474. https://doi.org/10.1631/fitee.1800573
[12]
Blin, P., Aditya, T., Santosa, P.B. and Claramunt, C. (2023) A Methodological Approach Towards Cyber Risk Management in Land Administrations Systems. Land, 13, Article 19. https://doi.org/10.3390/land13010019
[13]
Skytterholm, A.N. and Jaatun, M.G. (2023) Exploring the Need for a CERT for the Norwegian Construction Sector. In: Onwubiko, C., et al., Eds., Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media, Springer, 57-73.
[14]
Sholihah, I.M., Setiawan, H. and Nabila, O.G. (2021) Design and Development of Information Sharing and Analysis Center (ISAC) as an Information Sharing Platform. 2021 Sixth International Conference on Informatics and Computing (ICIC), Jakart 3-4 November 2021, 1-6. https://doi.org/10.1109/icic54025.2021.9632989
[15]
Aditya Putra, F. (2022) Tata Kelola Ekosistem Berbagi Informasi Keamanan Siber pada Information Sharing and Analysis Center (ISAC) Sektor Pemerintah Daerah di Indonesia. Info Kripto, 16, 23-32. https://doi.org/10.56706/ik.v16i1.39
[16]
Wallis, T. and Leszczyna, R. (2022) EE-ISAC—Practical Cybersecurity Solution for the Energy Sector. Energies, 15, Article 2170. https://doi.org/10.3390/en15062170
[17]
(2024) IBM X-Force Threat Intelligence Index 2024 Synthèse. https://www.ibm.com/downloads/cas/XQMYXR4A
[18]
Australian Signals Directorate (ASD) and Australian Cyber Security Centre (ACSC) (2022) Annual Cyber Threat Report 2022.
[19]
Halima Ibrahim, K. (2024) Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure. https://www.jucs.org/jucs_25_11/cyber_threat_intelligence_for/jucs_25_11_1478_1502_kure.pdf
[20]
Khafian, N. (2023) The Role of Collaborative Governance in Indonesian Disaster Management. Journal of Governance and Administrative Reform, 4, 158-175. https://doi.org/10.20473/jgar.v4i2.53367
[21]
Singh, G.P., Bharti, V. and Hooda, M.K. (2022) An Analysis of Common Vulnerabilities and Exposures in View of MITRE ATT&CK. Asian Journal of Convergence in Technology, 8, 15-17. https://doi.org/10.33130/ajct.2022v08i02.004
[22]
Machalewski, T., Szymanek, M., Czubak, A. and Turba, T. (2024) Expressing Impact of Vulnerabilities: An Expert-Filled Dataset and Vector Changer Framework for Modelling Multistage Attacks, Based on Cve, Cvss and Cwe. ECMS 2024 Proceedings, Cracow, 4-7 June 2024, 569-578. https://doi.org/10.7148/2024-0569
[23]
Jacobs, J., Romanosky, S., Edwards, B., Adjerid, I. and Roytman, M. (2021) Exploit Prediction Scoring System (EPSS). Digital Threats: Research and Practice, 2, 1-17. https://doi.org/10.1145/3436242
[24]
Jahani Chehrehbargh, F., Rajabifard, A., Atazadeh, B. and Steudler, D. (2024) Current Challenges and Strategic Directions for Land Administration System Modernisation in Indonesia. Journal of Spatial Science, 69, 1097-1129. https://doi.org/10.1080/14498596.2024.2360531
[25]
Yagi, S., Tsuchikawa, K. and Tsuji, K. (2024) A Heatmap-Based Visualization Technique for Finding Operational Problems. https://discovery.researcher.life/article/a-heatmap-based-visualization-technique-for-finding-operational-problems/8c5461b514c13bd6bcff6aff0ca3c296
[26]
Aditya, T. (2023) Visualizing Title Uncertainty and Quality Issues in the Digital Era of Land Administration. https://fig.net/resources/proceedings/fig_proceedings/7_2023/papers/se02/SE02_aditya_12363.pdf
[27]
Sakellariou, G., Fouliras, P., Mavridis, I. and Sarigiannidis, P. (2022) A Reference Model for Cyber Threat Intelligence (CTI) Systems. Electronics, 11, Article 1401. https://doi.org/10.3390/electronics11091401
[28]
Wilhoit, K. and Opacki, J. (2022) Operationalizing Threat Intelligence: A Guide to Developing and Operationalizing Cyber Threat Intelligence Programs. Packt Publishing Ltd.
[29]
Teichmann, F.M. and Boticiu, S.R. (2024) Cyber Threat Intelligence: Existing Benefits and Challenges for Law Firms and Businesses. International Cybersecurity Law Review, 5, 491-499. https://doi.org/10.1365/s43439-024-00117-1
[30]
Valdés Ríos, V., Zaidi, F., Cavalli, A.R. and Rego, A. (2024) Towards the Adoption of Automated Cyber Threat Intelligence Information Sharing with Integrated Risk Assessment. Proceedings of the 19th International Conference on Availability, Reliability and Security, Vienna, 30 July-2 August 2024, 1-9. https://doi.org/10.1145/3664476.3670444
[31]
Hank, S.W. (2024) Transforming Unstructured Data Sources into Structured Cyber Threat Intelligence. https://medium.shawnhank.com/transforming-unstructured-data-sources-into-structured-cyber-threat-intelligence-415b23b67bc5
[32]
Jo, H., Lee, Y. and Shin, S. (2022) Vulcan: Automatic Extraction and Analysis of Cyber Threat Intelligence from Unstructured Text. Computers & Security, 120, Article ID: 102763. https://doi.org/10.1016/j.cose.2022.102763
[33]
Jacobs, J., Romanosky, S., Adjerid, I. and Baker, W. (2020) Improving Vulnerability Remediation through Better Exploit Prediction. Journal of Cybersecurity, 6, tyaa015. https://doi.org/10.1093/cybsec/tyaa015
[34]
Li, L., Huang, C. and Chen, J. (2024) Automated Discovery and Mapping Att&ck Tactics and Techniques for Unstructured Cyber Threat Intelligence. Computers & Security, 140, Article ID: 103815. https://doi.org/10.1016/j.cose.2024.103815
[35]
Ramsdale, A., Shiaeles, S. and Kolokotronis, N. (2020) A Comparative Analysis of Cyber-Threat Intelligence Sources, Formats and Languages. Electronics, 9, Article 824. https://doi.org/10.3390/electronics9050824
[36]
Jacobs, J. and Romanosky, S. (2024) Probability, Percentiles, and Binning—How to Understand and Interpret EPSS Scores. https://www.first.org/epss/articles/prob_percentile_bins
[37]
Lee, J. and Kang, M. (2015) Geospatial Big Data: Challenges and Opportunities. Big Data Research, 2, 74-81. https://doi.org/10.1016/j.bdr.2015.01.003
[38]
Bennett, R.M., Unger, E., Lemmen, C. and Dijkstra, P. (2021) Land Administration Maintenance: A Review of the Persistent Problem and Emerging Fit-For-Purpose Solutions. Land, 10, Article 509. https://doi.org/10.3390/land10050509
[39]
Roccia, T. (2023) Visual Threat Intelligence: An Illustrated Guide for Threat Researchers. Independently Published.
[40]
Irwin, D. and Mandel, D.R. (2019) Improving Information Evaluation for Intelligence Production. Intelligence and National Security, 34, 503-525. https://doi.org/10.1080/02684527.2019.1569343
[41]
Irwin, D. and Mandel, D.R. (2019) Improving Information Evaluation for Intelligence Production. Intelligence and National Security, 34, 503-525. https://doi.org/10.1080/02684527.2019.1569343
[42]
Blin, P.-F. (2025) Proactive Cybersecurity for Spatial Cadastral Data of Land Administration System. Ph.D. Thesis, Universitas Gadjah Mada.