{"title":"网络威胁情报在改进安全运营方面的有效性","authors":"Joshua Smallman","doi":"10.60087/jaigs.v5i1.193","DOIUrl":null,"url":null,"abstract":"The purpose of this research was to comprehensively evaluate the effectiveness of Cyber Threat Intelligence (CTI) in enhancing security operations, while simultaneously identifying the various barriers to its adoption. Additionally, the study aimed to provide potential solutions to mitigate the identified barriers, to ensure successful adoption of CTI.A systematic review was undertaken to identify the main factors of enhanced security operations. Relevant questions and statements were then developed from these factors and a questionnaire was created using Google Forms. These questionnaires were then distributed via email to a sample size of 50 information technology professionals. These results were then analyzed using Microsoft Excel and SPSS. Overall, the research revealed that companies who used CTI reported significant gains in threat detection and response, risk management and threat-hunting abilities, which in turn lead to enhanced security operations. According to the research, several factors prevented organizations from adopting CTI. Among these were technological, regulatory, ignorance-related, and lack of executive support. Finally, to tackle these identified barriers the following were proposed adopting comprehensive awareness and education programs, the formation of an Executive CTI Steering Committees, structured CTI training and skills development programs, technology assessment and modernization initiative-based initiatives, proactive compliance, and legal strategies.","PeriodicalId":517201,"journal":{"name":"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023","volume":"27 12","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Effectiveness of Cyber Threat Intelligence in Improving Security Operations\",\"authors\":\"Joshua Smallman\",\"doi\":\"10.60087/jaigs.v5i1.193\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The purpose of this research was to comprehensively evaluate the effectiveness of Cyber Threat Intelligence (CTI) in enhancing security operations, while simultaneously identifying the various barriers to its adoption. Additionally, the study aimed to provide potential solutions to mitigate the identified barriers, to ensure successful adoption of CTI.A systematic review was undertaken to identify the main factors of enhanced security operations. Relevant questions and statements were then developed from these factors and a questionnaire was created using Google Forms. These questionnaires were then distributed via email to a sample size of 50 information technology professionals. These results were then analyzed using Microsoft Excel and SPSS. Overall, the research revealed that companies who used CTI reported significant gains in threat detection and response, risk management and threat-hunting abilities, which in turn lead to enhanced security operations. According to the research, several factors prevented organizations from adopting CTI. Among these were technological, regulatory, ignorance-related, and lack of executive support. Finally, to tackle these identified barriers the following were proposed adopting comprehensive awareness and education programs, the formation of an Executive CTI Steering Committees, structured CTI training and skills development programs, technology assessment and modernization initiative-based initiatives, proactive compliance, and legal strategies.\",\"PeriodicalId\":517201,\"journal\":{\"name\":\"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023\",\"volume\":\"27 12\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.60087/jaigs.v5i1.193\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.60087/jaigs.v5i1.193","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Effectiveness of Cyber Threat Intelligence in Improving Security Operations
The purpose of this research was to comprehensively evaluate the effectiveness of Cyber Threat Intelligence (CTI) in enhancing security operations, while simultaneously identifying the various barriers to its adoption. Additionally, the study aimed to provide potential solutions to mitigate the identified barriers, to ensure successful adoption of CTI.A systematic review was undertaken to identify the main factors of enhanced security operations. Relevant questions and statements were then developed from these factors and a questionnaire was created using Google Forms. These questionnaires were then distributed via email to a sample size of 50 information technology professionals. These results were then analyzed using Microsoft Excel and SPSS. Overall, the research revealed that companies who used CTI reported significant gains in threat detection and response, risk management and threat-hunting abilities, which in turn lead to enhanced security operations. According to the research, several factors prevented organizations from adopting CTI. Among these were technological, regulatory, ignorance-related, and lack of executive support. Finally, to tackle these identified barriers the following were proposed adopting comprehensive awareness and education programs, the formation of an Executive CTI Steering Committees, structured CTI training and skills development programs, technology assessment and modernization initiative-based initiatives, proactive compliance, and legal strategies.