Essays about: "Cyber threat intelligence"
Showing result 1 - 5 of 13 essays containing the words Cyber threat intelligence.
-
1. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE
-
2. BRIDGING THE GAP IN VULNERABILITY MANAGEMENT : A tool for centralized cyber threat intelligence gathering and analysis
University essay from Luleå tekniska universitet/DatavetenskapAbstract : A large number of organizations these days are offering some kind of digital services, relyon digital technologies for processing, storing, and sharing of information, are harvesting moderntechnologies to offer remote working arrangements and may face direct cybersecurity risks. Theseare some of the properties of a modern organization. READ MORE
-
3. The Effect of Zero Trust Model on Organizations
University essay from Lunds universitet/Institutionen för informatikAbstract : The increase in cyber threats has prompted organizations to adopt more robust cybersecurity frameworks, such as the Zero Trust model. This study investigates the effects of implementing the Zero Trust model on organizations. READ MORE
-
4. Evaluation of ChatGPT as a cybersecurity tool : An experimental CTF based approach
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The aim of this thesis is to evaluate the artificial intelligence model ChatGPT as a tool in the cybersecurity domain. With the purpose of analysing and facilitating understanding of the technology’s effects on possible threats. The development of AI models has a potential to alter the knowledge required to perform malicious activities. READ MORE
-
5. Comparison of adversary emulation tools for reproducing behavior in cyber attacks
University essay from Linköpings universitet/Databas och informationsteknikAbstract : As cyber criminals can find many different ways of gaining unauthorized access to systems without being detected, it is of high importance for organizations to monitor what is happening inside their systems. Adversary emulation is a way to mimic behavior of advanced adversaries within cyber security, which can be used to test detection capabilities of malicious behavior within a system of an organization. READ MORE