Articles | Open Access | DOI: https://doi.org/10.55640/jsshrf-04-02-06

CYBER THREAT INTELLIGENCE: UNDERSTANDING HOW ORGANIZATIONS GATHER AND ANALYZE INFORMATION TO PROTECT THEIR SYSTEMS AND DATA

Jasur Yusubov , Director Of Jizzakh State Pedagogical University Academic Lyceum, Uzbekistan
Sardorbek Kholmurodov , Student Jizzakh State Pedagogical University Academic Lyceum, Uzbekistan

Abstract

In today's digital age, the proliferation of cyber threats poses significant risks to organizations' systems and data. Cyber threat intelligence (CTI) has emerged as a vital component of modern cybersecurity strategies, enabling organizations to proactively defend against potential threats. This article explores how organizations gather and analyze information about cyber threats to protect their systems and data.

By leveraging diverse data sources such as open-source intelligence, dark web monitoring, and information sharing, organizations enhance their understanding of threat actors' tactics and motivations. Advanced analysis techniques, including data mining, machine learning, and human expertise, enable organizations to identify emerging threats and prioritize their response effectively.

The implementation of CTI has led to improved threat detection, enhanced situational awareness, and proactive defense measures. However, challenges such as data overload and the need for skilled analysts must be addressed to maximize the effectiveness of CTI. Ultimately, CTI plays a crucial role in fortifying organizations' resilience against the evolving cyber threat landscape. ‎

Keywords

Cyber Threat Intelligence, Information Gathering, Threat Analysis Cybersecurity, Data Protection

References

Rid, T., & McBurney, P. (2012). Cyber-Weapons. RUSI Journal, 157(6), 6-13.

Liao, Q., & Desmet, L. (2013). Cyber Threat Intelligence. International Journal of Cyber Warfare and Terrorism, 3(4), 41-52.

Research Institute of America. (2020). Global Cyber Threat Intelligence Research Report.

Buczak, A. L., & Guven, E. (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.

Sharma, S. K., Er, M. J., & Jhaveri, R. H. (2017). Cyber Threat Intelligence: Challenges and Opportunities. In 2017 IEEE International Conference on Smart Cloud (SmartCloud) (pp. 125-134). IEEE.

Sood, A. K., & Enbody, R. J. (2013). Cyber Threat Intelligence: Who Can You Trust? IEEE Security & Privacy, 11(1), 24-32.

Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). National Institute of Standards and Technology.

Slay, J., & Mislan, R. (2016). Cyber Threat Intelligence: Bridging the Gap Between Security and Business. Information Systems Security, 25(1), 3-14.

Hutchins, E. M., Cloppert, M. J., & Amin, R. M. (2011). Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Leading Issues in Information Warfare & Security Research, 1(1), 80-101.

Luiijf, E., & Besseling, K. (2012). The Landscape of Cyber Threat Intelligence. In 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS) (pp. 1-8). IEEE.

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

Jasur Yusubov, & Sardorbek Kholmurodov. (2024). CYBER THREAT INTELLIGENCE: UNDERSTANDING HOW ORGANIZATIONS GATHER AND ANALYZE INFORMATION TO PROTECT THEIR SYSTEMS AND DATA. Journal of Social Sciences and Humanities Research Fundamentals, 4(02), 27–32. https://doi.org/10.55640/jsshrf-04-02-06