作者
Ensar Seker
发表日期
2019
期刊
https://www.researchgate.net/publication/335692544_Cyber_Threat_Intelligence_Understanding_Fundamentals
出版商
https://www.researchgate.net/publication/335692544_Cyber_Threat_Intelligence_Understanding_Fundamentals
简介
Threat intelligence is proved based on information, including setting, instruments, pointers, suggestions and noteworthy guidance, around a current or developing threat or risk to assets (such as unauthorized access, unauthorized use of assets, discloses sensitive information, unauthorized changes to an asset, deny access). Studying advanced adversary tactics, techniques and procedures are also part of cyber threat intelligence (CTI) and it can help find breaches or a typical movement, as well as help to get adversaries and prevent threats even before they take place. Minimizing false positives (and false negatives) with cyber threat intelligence increase the effectiveness of the cyber defense. Before using CTI, it is important to define and understand it. This article aims to describe and explain all the basics about CTI.
引用总数
2020202120222023133
学术搜索中的文章