{"title":"Threat Intelligence technology and methods of its use to protect the company from cyber threats","authors":"O. O. Dorokhin, V. Marchenko, I. D. Semenova","doi":"10.31673/2409-7292.2021.031216","DOIUrl":null,"url":null,"abstract":"The article is devoted to the methods of using Threat Intelligence technology (\"threat intelligence\" or \"cyber intelligence\" in English) in companies that need to build a secure IT infrastructure and mechanisms to counter information security threats using this technology. The value of Threat Intelligence against the background of existing cyber threats has been studied. Ways to implement Threat Intelligence technology are described. The process of working with Threat Intelligence is described step by step, recommendations are given to get the most out of cyber intelligence.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2021.031216","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The article is devoted to the methods of using Threat Intelligence technology ("threat intelligence" or "cyber intelligence" in English) in companies that need to build a secure IT infrastructure and mechanisms to counter information security threats using this technology. The value of Threat Intelligence against the background of existing cyber threats has been studied. Ways to implement Threat Intelligence technology are described. The process of working with Threat Intelligence is described step by step, recommendations are given to get the most out of cyber intelligence.