Network breaches are happening at a phenomenal scale. The unabated exponential level is forcing enterprise systems to scramble for solutions since the world is so interconnected and digitized and the internet knows no boundaries. Due to big data explosion, the platform for attackers to work continues to grow. Most breached entities are not aware that they have been compromised for weeks but finds out after an external audit or a third party notifies the organizations. Since most networks will be breached at some point, it is proper to note that legacy platforms will no longer stand a chance to defend against the signature-less attacks. This study will create threat awareness, find out capabilities of threat actors, their motivations and objectives and identify best practices.
Opara, Emmnauel U. Dr and Hussein, Mohammed T. Dr
"Cyber Security, Threat Intelligence: Defending the Digital Platform,"
Journal of International Technology and Information Management: Vol. 26
, Article 7.
Available at: https://scholarworks.lib.csusb.edu/jitim/vol26/iss1/7
Business Intelligence Commons, Communication Technology and New Media Commons, Computer and Systems Architecture Commons, Data Storage Systems Commons, Digital Communications and Networking Commons, E-Commerce Commons, Information Literacy Commons, Management Information Systems Commons, Management Sciences and Quantitative Methods Commons, Operational Research Commons, Science and Technology Studies Commons, Social Media Commons, Technology and Innovation Commons