Essays about: "Cyber threat intelligence"

Showing result 1 - 5 of 13 essays containing the words Cyber threat intelligence.

  1. 1. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Love Andrén; [2024]
    Keywords : Threat Intelligence; Open-source; Information Sharing; Cyber Security;

    Abstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE

  2. 2. BRIDGING THE GAP IN VULNERABILITY MANAGEMENT : A tool for centralized cyber threat intelligence gathering and analysis

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Panagiotis Vlachos; [2023]
    Keywords : Vulnerability management; Cyber threat intelligence; Common vulnerability scoring system; Exploit prediction scoring system;

    Abstract : A large number of organizations these days are offering some kind of digital services, relyon digital technologies for processing, storing, and sharing of information, are harvesting moderntechnologies to offer remote working arrangements and may face direct cybersecurity risks. Theseare some of the properties of a modern organization. READ MORE

  3. 3. The Effect of Zero Trust Model on Organizations

    University essay from Lunds universitet/Institutionen för informatik

    Author : Umar Shahzad; Can Lu; [2023]
    Keywords : Zero Trust; Cybersecurity; Organization; Business and Economics; Social Sciences; Technology and Engineering;

    Abstract : The increase in cyber threats has prompted organizations to adopt more robust cybersecurity frameworks, such as the Zero Trust model. This study investigates the effects of implementing the Zero Trust model on organizations. READ MORE

  4. 4. Evaluation of ChatGPT as a cybersecurity tool : An experimental CTF based approach

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Engman; [2023]
    Keywords : ChatGPT; AI; CTF; Cybersecurity; Capture the flag; ChatGPT; AI; CTF; Cybersäkerhet; Capture the flag;

    Abstract : The aim of this thesis is to evaluate the artificial intelligence model ChatGPT as a tool in the cybersecurity domain. With the purpose of analysing and facilitating understanding of the technology’s effects on possible threats. The development of AI models has a potential to alter the knowledge required to perform malicious activities. READ MORE

  5. 5. Comparison of adversary emulation tools for reproducing behavior in cyber attacks

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Joakim Elgh; [2022]
    Keywords : Adversary emulation; Adversary emulation tools; Behavior; Event logs; APT; Advanced Persistent Threat;

    Abstract : As cyber criminals can find many different ways of gaining unauthorized access to systems without being detected, it is of high importance for organizations to monitor what is happening inside their systems. Adversary emulation is a way to mimic behavior of advanced adversaries within cyber security, which can be used to test detection capabilities of malicious behavior within a system of an organization. READ MORE