Abstract
The use of threat intelligence is progressing in corporate-based security frameworks typified by computer security incident response teams (CSIRTs) in order to defend networks and systems against increasingly sophisticated cyberattacks. It is becoming necessary to obtain a deeper understanding of threat intelligence and to deal with more advanced forms of such information. This article presents an analysis of attacker motivation using threat intelligence. The usefulness of threat intelligence in actual on-site CSIRT activities is also explained.
Author supplied keywords
Cite
CITATION STYLE
Konno, S. (2018). Collecting, analyzing, and leveraging threat intelligence at NTT-CERT. NTT Technical Review, 16(5). https://doi.org/10.53829/ntr201805fa2
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.