首页> 外文学位 >Actionability of cyber threat intelligence.
【24h】

Actionability of cyber threat intelligence.

机译:网络威胁情报的可操作性。

获取原文
获取原文并翻译 | 示例

摘要

The increased dependency organizations have on technology is not slowing down. The amount of data produced and stored within these technologies also increase the amount of cyber threats that face organizations today. Security analysts need to understand how adversaries are targeting their organizations in order to proactively defend their assets and networks. Cyber threat intelligence is a growing need for an organization's security in order to fight against cyber-attacks. However, the only way security teams can utilize cyber threat intelligence is if it is consumable, credible, and actionable. The purpose of this research was to question the actionability of cyber threat intelligence. The research is intended to address the following questions: What are the consequences of too much data? How do cyber fusion threat centers or information sharing centers assist in determining the actionability of cyber threat intelligence? What is the human role in the analysis of cyber threat intelligence? This research provided a detailed introduction on the increasing amount of raw data security analysts need to analyze is overwhelming and difficult to understand. Cyber fusion and information analysis centers are becoming an asset for organizations to assist in further understanding the threats targeting their networks. It is also important that cyber threat intelligence analysts not only focus on the technical aspects of analysis but also the human factor of their adversaries. The actionability of cyber threat intelligence will be an important advantage for security analysts as well as senior management to mitigate the risk of cyber-attacks against their organization's critical assets. Keywords: Cybersecurity, Actionability of Cyber Threat Intelligence, Professor Christopher Riddell, Connect the Dots, Actionable, Fusion Center, Threat.
机译:组织对技术的依赖性增加并没有放缓。这些技术中产生和存储的数据量也增加了当今组织面临的网络威胁数量。安全分析师需要了解对手如何针对他们的组织,以便主动防御其资产和网络。为了应对网络攻击,网络威胁情报对组织安全性的需求日益增长。但是,安全团队可以利用网络威胁情报的唯一方法是消耗性,可信性和可操作性。这项研究的目的是质疑网络威胁情报的可操作性。该研究旨在解决以下问题:数据过多会带来什么后果?网络融合威胁中心或信息共享中心如何帮助确定网络威胁情报的可操作性?在分析网络威胁情报中,人的角色是什么?这项研究详细介绍了越来越多的原始数据安全分析师需要分析的数据是压倒性的和难以理解的。网络融合和信息分析中心正在成为组织的资产,以帮助他们进一步了解针对其网络的威胁。网络威胁情报分析师不仅要关注分析的技术方面,而且还要关注对手的人为因素,这一点也很重要。网络威胁情报的可操作性将是安全分析人员和高级管理人员减轻网络攻击对其组织的重要资产的风险的重要优势。关键字:网络安全,网络威胁情报的可操作性,克里斯托弗·里德尔(Christopher Riddell)教授,连接点,可行,融合中心,威胁。

著录项

  • 作者

    Shouse, Kurt.;

  • 作者单位

    Utica College.;

  • 授予单位 Utica College.;
  • 学科 Artificial intelligence.;Computer science.
  • 学位 M.S.
  • 年度 2015
  • 页码 63 p.
  • 总页数 63
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号