Font Size: a A A

Study On The U.S.Cyber Threat Intelligence Work

Posted on:2019-01-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y J HuangFull Text:PDF
GTID:2416330611993567Subject:Military master
Abstract/Summary:PDF Full Text Request
With the development and popularization of Internet technology,cyberspace has been continuously expanded,and it has become the fifth demension space after land,sea,air,sky.Cyberspace security is facing severe challenges.In recent years,the development of cyber attacks technology has changed rapidly.The traditional security measures such as Intrusion Detection System and Firewall have been unable to effectively defend against increasingly complex cyber attacks.Cyber Threat Intelligence based on the idea of active defense of threat information sharing emerged in this context.As the place of origin of computer networks,the United States is also recognized as a network powerful nation,and its researches on cyber security is a world leader.In response to the ever-changing cyber attacks,the United States first proposed the concept of Cyber Threat Intelligence and quickly applied it to the military and private enterprises.Therefore,studying the theory and practice of Cyber Threat Intelligence work in the United States has import reference significance for Chinese army to do Cyber Threat Intelligence work under the conditions of informatization.This articles is divided into six chapters.The first chapter explains the significance and current situation of Cyber Threat Intelligence research in the United States,and sorts out the core concepts of Cyber Intelligence,Cybersecurity,Advanced Persistent Threats,Cyber Threat Intelligence.The second chapter summarizes the background and main actions of Cyber Threat Intelligence work.The third chapter describes the main content of the U.S.Cyber Threat Intelligence work.The fourth chapter analyzes the organization and implementation of the U.S.Cyber Threat Intelligence work.The fifth chapter analyzes the status of the U.S.Cyber Threat Intelligence work and evaluates its effectiveness and deficiencies.On the basis of the previous papers,the last chapter analyzes and predicts the development trendency of the U.S.Cyber Threat Intelligence work,and combines our military actual situation to think about the development of Cyber Threat Intelligence work under the informatization conditions in Chinese army,and draws some useful inspirations.
Keywords/Search Tags:U.S., Cyber security, Cyber Threat Intelligence, Cyber Threat Intelligence work
PDF Full Text Request
Related items