Cyber Threats and Exploring the Sources of Cyber Threat Intelligence
Downloads
Cyber threat intelligence technology becomes a necessity in the context of the exponential evolution of information systems. The methods used by malicious actors are constantly evolving, becoming more and more sophisticated over time, thus making the task of security teams more difficult. This article aims to investigate cyber threats, providing information necessary to understand and detect the mode of operation of the attack, to then decline and disseminate it within the information systems to be protected. Advanced threat intelligence thus supports proactive monitoring of emerging threats by determining trends in the cyber landscape.
Downloads
https://www.microsoft.com/ro-ro/security/business/security-101/what-is-cyber-threat-intelligence
https://www.bitdefender.com/ro-ro/business/products/advanced-threat-intelligence
R. Trifonov, O. Nakov, V. Mladenov, "Artificial Intelligence in Cyber Threats Intelligence". 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). IEEE. pp. 1-4. doi: 10.1109/ICONIC.2018.8601235. ISBN 978-1-5386-6477-3. S2CID 57755206.
CyberProof Inc. (n.d.). Managed Threat Intelligence. CyberProof. Retrieved on April 03, 2023 from https://www.cyberproof.com/cyber-101/managed-threat-intelligence/
Dalziel, Henry (2014). How to Define and Build an Effective Cyber Threat Intelligence Capability. Syngress. ISBN 9780128027301.
Kant, Neelima (2024). "Cyber Threat Intelligence (CTI): An Analysis on the Use of Artificial Intelligence and Machine Learning to Identify Cyber Hazards". Cyber Security and Digital Forensics. Lecture Notes in Networks and Systems. Vol. 36. pp. 449-462. doi: 10.1007/978-981-99-9811-1_36. ISBN 978-981-99-9810-4.
Conti, M. (2021). "Measuring and Visualizing Cyber Threat Intelligence Quality". International Journal of Information Security. 20:21-38. doi: 10.1007/s10207-020-00490-y.
Shackleford, D. (2015). Who's Using Cyberthreat Intelligence and How?. SANS Institute. https://cdn-cybersecurity.att.com/docs/SANS-Cyber-Threat-Intelligence-Survey-2015.pdf