Cyber Threat Intelligence (CTI) using Dark Web / (Record no. 610452)

000 -LEADER
fixed length control field 01734nam a22001457a 4500
003 - CONTROL NUMBER IDENTIFIER
control field NUST
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8,RAZ
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Raza, Ali
9 (RLIN) 19808
245 ## - TITLE STATEMENT
Title Cyber Threat Intelligence (CTI) using Dark Web /
Statement of responsibility, etc. GC Ali Raza, GC Afzaal Ahmed, GC Abdullah Sallah.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. MCS, NUST
Name of publisher, distributor, etc. Rawalpindi
Date of publication, distribution, etc. 2024
300 ## - PHYSICAL DESCRIPTION
Extent 65 p
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note In an era characterized by digital warfare, organizations around the world are engaged in a never-ending conflict with constantly changing cyber threats. A hidden area of internet known as the dark web, has become a center for illegal activity, such as the tools used by illicit actors and the sharing of sensitive information. As a component of cybersecurity, CTI helps identify and reduce risks that arise from the undiscovered areas of the internet. Other than data collection, CTI's significance lies in developing tools and techniques to extract useful information from the wide range of online platforms, markets, and encrypted communication channels.<br/>The quantity of Internet of Things devices made possible by hackers increases the likelihood of exploitation through hacker resources. These hackers’ resources can be shared among communities of threat actors on the Dark web. Despite rising curiosity in the Dark web there remains uncertainty about the extent and volume of hacker resources that can be uncovered.<br/>In today's digital era rife with cyber threats CTI acts as a defense against entities intent on leveraging vulnerabilities, for illicit purposes. By utilizing technology and insights, from data analysis CTI professionals work to protect assets and maintain the authenticity of digital environments.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Supervisor Dr. Faisal Amjad
9 (RLIN) 124649
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Project Report

No items available.

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.