...
首页> 外文期刊>International journal of intelligence and counter intelligence >U.S. Cyber Threat Intelligence Sharing Frameworks
【24h】

U.S. Cyber Threat Intelligence Sharing Frameworks

机译:美国网络威胁情报共享框架

获取原文
获取原文并翻译 | 示例
           

摘要

Malicious actors in cyberspace are gaining increasingly sophisticated tools, techniques, and procedures that are outpacing security solutions. Organized criminals and state-sponsored groups now have ample resources to disrupt or breach conventional defenses. Underground hacker markets provide them with ready access to a plethora of products and services.~1 Attackers often rent large botnets or use similar attack tool kits. For instance, the intelligence firm Crowdstrike recently found twelve malicious groups in China using the same exploit codes within 24 to 72 hours of each other.~2 In many cases, malicious attempts to obtain valuable, sensitive data are not isolated, but part of multi-year campaigns. For their victims, the costs of a successful attack can add up in professional services, lost opportunities, and downtime, plus reputation damage, to almost a million dollars.~3 Targeted organizations need a holistic view of the threat landscape and a proactive security posture to defend against the multitude of threats. Knowing the who, what, where, how, and when of a malicious activity is the only way to decrease its chance of success. Cyber threat intelligence provides knowledge of a malicious actor's capabilities, infrastructure, motives, goals, and resources in cyberspace. The use of this intelligence enables an organization to prioritize defenses around prized assets, focusing on vulnerabilities and ways that an adversary activity can be mitigated.
机译:网络空间中的恶意行为者正在获得越来越复杂的工具,技术和程序,其速度已超过安全解决方案。现在,有组织的犯罪分子和政府资助的团体有足够的资源来破坏或破坏常规防御。地下黑客市场为他们提供了访问大量产品和服务的便捷途径。〜1攻击者经常租用大型僵尸网络或使用类似的攻击工具套件。例如,情报机构Crowdstrike最近在中国发现了十二个恶意团体,彼此之间在24至72小时内使用相同的利用代码。〜2在许多情况下,并非没有恶意的尝试来获取有价值的敏感数据,而是多种尝试的一部分。年运动。对于他们的受害者来说,成功攻击的成本可能会增加专业服务,机会损失和停机时间,再加上声誉受损,将近一百万美元。〜3目标组织需要全面了解威胁状况和主动安全态势防御多种威胁。知道谁,什么,在哪里,如何以及何时进行恶意活动是减少其成功机会的唯一方法。网络威胁情报可提供有关恶意行为者的能力,基础架构,动机,目标和网络空间资源的知识。利用这种情报,组织可以优先考虑珍贵资产的防御措施,着重于漏洞和可以减轻对手活动的方式。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号