Authors :
Rajesh Kumar
Volume/Issue :
Volume 9 - 2024, Issue 9 - September
Google Scholar :
https://tinyurl.com/5ymce4xc
Scribd :
https://tinyurl.com/3h2n7r6n
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24SEP430
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Modern cybersecurity protocols face
unprecedented hurdles from the dynamic cyber threat
ecology. In this context, the value of cyber threat
intelligence as a prophylactic protective strategy increase
(Abu, Selamat, Ariffin , & Yusof, 2018). This study
provides a futuristic analysis of cyber threat intelligence,
emphasizing the vital role that it will play in anticipating
and becoming ready for evolving threats. This article
also looks at threat actor methods, attack paths, and
emerging technologies in an attempt to illustrate the
dynamic nature of cyber threats and the need for
adaptive intelligence solutions (Abu, Selamat, Ariffin , &
Yusof, 2018). Ethical and legal considerations are also
explored to highlight the necessity for a thorough and
responsible approach to the gathering and
implementation of cyber threat intelligence (Wagner,
2019). Through this thorough examination, readers will
get a substantial comprehension of the technical
developments and strategic requirements that will
impact how cyber threat intelligence is developed (Abu,
Selamat, Ariffin , & Yusof, 2018) (Wagner, 2019). This
will provide enterprises with the agility and resilience to
predict, mitigate, and respond to future cyber-attacks.
Keywords :
Cyber Threat Intelligence, Cybersecurity, Strategic Imperatives, Risk Mitigation, Cyber Threats, and Evolving Threats.
References :
- Abu, M. S., Selamat, S. R., Ariffin, A., & Yusof, R. (2018). Cyber threat intelligence–issue and challenges. Indonesian Journal of Electrical Engineering and Computer Science, 10(1), 371-379.
- Wagner, T. D., Mahbub, K., Palomar, E., & Abdallah, A. E. (2019). Cyber threat intelligence sharing: Survey and research directions. Computers & Security, 87, 101589.
- Ramsdale, A., Shiaeles, S., & Kolokotronis, N. (2020). A comparative analysis of cyber-threat intelligence sources, formats, and languages. Electronics, 9(5), 824.
- Tounsi, W. (2019). What is cyber threat intelligence and how is it evolving? Cyber‐Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT, 1-49.
- Conti, M., Dargahi, T., & Dehghantanha, A. (2018). Cyber threat intelligence: challenges and opportunities (pp. 1-6). Springer International Publishing.
- Keim, Y., & Mohapatra, A. K. (2022). Cyber threat intelligence framework using advanced malware forensics. International Journal of Information Technology, 14(1), 521-530.
- Bromander, S. (2021). Ethical considerations in sharing cyber threat intelligence. Understanding Cyber Threat Intelligence-Towards Automation, 45.
- Saeed, S., Suayyid, S. A., Al-Ghamdi, M. S., Al-Muhaisen, H., & Almuhaideb, A. M. (2023). A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. Sensors, 23(16), 7273. https://doi.org/10.3390/s23167273
- Security, M. (2024, April 24). What will cyber threats look like in 2024? CSO Online. https://www.csoonline.com/article/2095115/what-will-cyber-threats-look-like-in-2024.html
- Patsavellas, J., Kaur, R., & Salonitis, K. (2021). Supply chain control towers: Technology push or market pull—An assessment tool. IET Collaborative Intelligent Manufacturing, 3(3), 290–302. https://doi.org/10.1049/cim2.12040
- What is Cyber Threat Intelligence? | Splunk. (n.d.). Splunk. https://www.splunk.com/en_us/blog/ learn/cyber-threat-intelligence-cti.html
Modern cybersecurity protocols face
unprecedented hurdles from the dynamic cyber threat
ecology. In this context, the value of cyber threat
intelligence as a prophylactic protective strategy increase
(Abu, Selamat, Ariffin , & Yusof, 2018). This study
provides a futuristic analysis of cyber threat intelligence,
emphasizing the vital role that it will play in anticipating
and becoming ready for evolving threats. This article
also looks at threat actor methods, attack paths, and
emerging technologies in an attempt to illustrate the
dynamic nature of cyber threats and the need for
adaptive intelligence solutions (Abu, Selamat, Ariffin , &
Yusof, 2018). Ethical and legal considerations are also
explored to highlight the necessity for a thorough and
responsible approach to the gathering and
implementation of cyber threat intelligence (Wagner,
2019). Through this thorough examination, readers will
get a substantial comprehension of the technical
developments and strategic requirements that will
impact how cyber threat intelligence is developed (Abu,
Selamat, Ariffin , & Yusof, 2018) (Wagner, 2019). This
will provide enterprises with the agility and resilience to
predict, mitigate, and respond to future cyber-attacks.
Keywords :
Cyber Threat Intelligence, Cybersecurity, Strategic Imperatives, Risk Mitigation, Cyber Threats, and Evolving Threats.