CYBER THREAT INTELLIGENCE: UNDERSTANDING HOW ORGANIZATIONS GATHER AND ANALYZE INFORMATION TO PROTECT THEIR SYSTEMS AND DATA

CC BY f
27-32
1
0
To share
Jasur Yusubov , ., & Sardorbek Kholmurodov, . (2024). CYBER THREAT INTELLIGENCE: UNDERSTANDING HOW ORGANIZATIONS GATHER AND ANALYZE INFORMATION TO PROTECT THEIR SYSTEMS AND DATA. Journal of Social Sciences and Humanities Research Fundamentals, 4(02), 27–32. Retrieved from https://inlibrary.uz/index.php/jsshrf/article/view/29983
Crossref
Сrossref
Scopus
Scopus

Abstract

In today's digital age, the proliferation of cyber threats poses significant risks to organizations' systems and data. Cyber threat intelligence (CTI) has emerged as a vital component of modern cybersecurity strategies, enabling organizations to proactively defend against potential threats. This article explores how organizations gather and analyze information about cyber threats to protect their systems and data.

By leveraging diverse data sources such as open-source intelligence, dark web monitoring, and information sharing, organizations enhance their understanding of threat actors' tactics and motivations. Advanced analysis techniques, including data mining, machine learning, and human expertise, enable organizations to identify emerging threats and prioritize their response effectively.

The implementation of CTI has led to improved threat detection, enhanced situational awareness, and proactive defense measures. However, challenges such as data overload and the need for skilled analysts must be addressed to maximize the effectiveness of CTI. Ultimately, CTI plays a crucial role in fortifying organizations' resilience against the evolving cyber threat landscape. ‎

References

Rid, T., & McBurney, P. (2012). Cyber-Weapons. RUSI Journal, 157(6), 6-13.

Liao, Q., & Desmet, L. (2013). Cyber Threat Intelligence. International Journal of Cyber Warfare and Terrorism, 3(4), 41-52.

Research Institute of America. (2020). Global Cyber Threat Intelligence Research Report.

Buczak, A. L., & Guven, E. (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.

Sharma, S. K., Er, M. J., & Jhaveri, R. H. (2017). Cyber Threat Intelligence: Challenges and Opportunities. In 2017 IEEE International Conference on Smart Cloud (SmartCloud) (pp. 125-134). IEEE.

Sood, A. K., & Enbody, R. J. (2013). Cyber Threat Intelligence: Who Can You Trust? IEEE Security & Privacy, 11(1), 24-32.

Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). National Institute of Standards and Technology.

Slay, J., & Mislan, R. (2016). Cyber Threat Intelligence: Bridging the Gap Between Security and Business. Information Systems Security, 25(1), 3-14.

Hutchins, E. M., Cloppert, M. J., & Amin, R. M. (2011). Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Leading Issues in Information Warfare & Security Research, 1(1), 80-101.

Luiijf, E., & Besseling, K. (2012). The Landscape of Cyber Threat Intelligence. In 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS) (pp. 1-8). IEEE.

inLibrary — это научная электронная библиотека inConference - научно-практические конференции inScience - Журнал Общество и инновации UACD - Антикоррупционный дайджест Узбекистана UZDA - Ассоциации стоматологов Узбекистана АСТ - Архитектура, строительство, транспорт Open Journal System - Престиж вашего журнала в международных базах данных inDesigner - Разработка сайта - создание сайтов под ключ в веб студии Iqtisodiy taraqqiyot va tahlil - ilmiy elektron jurnali yuridik va jismoniy shaxslarning in-Academy - Innovative Academy RSC MENC LEGIS - Адвокатское бюро SPORT-SCIENCE - Актуальные проблемы спортивной науки GLOTEC - Внедрение цифровых технологий в организации MuviPoisk - Смотрите фильмы онлайн, большая коллекция, новинки кинопроката Megatorg - Доска объявлений Megatorg.net: сайт бесплатных частных объявлений Skinormil - Космецевтика активного действия Pils - Мультибрендовый онлайн шоп METAMED - Фармацевтическая компания с полным спектром услуг Dexaflu - от симптомов гриппа и простуды SMARTY - Увеличение продаж вашей компании ELECARS - Электромобили в Ташкенте, Узбекистане CHINA MOTORS - Купи автомобиль своей мечты! PROKAT24 - Прокат и аренда строительных инструментов