Collecting, analyzing, and leveraging threat intelligence at NTT-CERT

1Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

Abstract

The use of threat intelligence is progressing in corporate-based security frameworks typified by computer security incident response teams (CSIRTs) in order to defend networks and systems against increasingly sophisticated cyberattacks. It is becoming necessary to obtain a deeper understanding of threat intelligence and to deal with more advanced forms of such information. This article presents an analysis of attacker motivation using threat intelligence. The usefulness of threat intelligence in actual on-site CSIRT activities is also explained.

Author supplied keywords

Cite

CITATION STYLE

APA

Konno, S. (2018). Collecting, analyzing, and leveraging threat intelligence at NTT-CERT. NTT Technical Review, 16(5). https://doi.org/10.53829/ntr201805fa2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free