Threat Intelligence technology and methods of its use to protect the company from cyber threats
DOI: 10.31673/2409-7292.2021.031216
DOI:
https://doi.org/10.31673/2409-7292.2021.031216Abstract
The article is devoted to the methods of using Threat Intelligence technology ("threat intelligence" or "cyber intelligence" in English) in companies that need to build a secure IT infrastructure and mechanisms to counter information security threats using this technology. The value of Threat Intelligence against the background of existing cyber threats has been studied. Ways to implement Threat Intelligence technology are described. The process of working with Threat Intelligence is described step by step, recommendations are given to get the most out of cyber intelligence.
Keywords: Threat Intelligence, SOC, monitoring, cyber intelligence, information security threats, cyber threats, compromise indicators, OWASP Top-10.
References
1. NIST SP 800-82 [Електронний ресурс] – Режим доступу до ресурсу: World Wide Web. – URL: https://csrc.nist.gov/publications/detail/sp/800-82/archive/2011-06-09 . Дата звернення: 26.07.2021
2. Організація OWASP. OWASP Top-10, головна сторінка [Електронний ресурс] – Режим доступу до ресурсу: https://owasp.org/Top10/ . Дата звернення: 26.07.2021.
3. Блог компанії R-Vision. Что такое threat intelligence и как применять? [Електронний ресурс] – Режим доступу до ресурсу: https://rvision.pro/blog-posts/chto-takoe-threat-intelligence-i-v-chem-ego-tsennost/ . Дата звернення: 26.07.2021.