ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Threat Defense through Cyber Fusion

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.12, No. 1)

Publication Date:

Authors : ;

Page : 24-27

Keywords : Cyber fusion; cyber security; advanced persistent threats (APTs);

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Using cyber fusion to detect advanced persistent threats (APTs) is a complex task requiring integrating and correlating multiple sources of information and data. APTs are a specific type of cyber-attack where an attacker establishes a long-term, undetected presence on a target's network to steal sensitive information or disrupt operations. Due to the nature of APTs, it can be hard to detect them and take action. However, using threat intelligence is also a key component of APT detection. It provides actionable information about new APTs and the tactics and techniques used by APT attackers, allowing organizations to adapt their defenses and be proactive in their threat response. It is also essential to have a well-coordinated incident response plan and a skilled team to manage the system to ensure that all aspects of the system are working together effectively and efficiently. Consequently, this systematic review of academic and professional literature examines latent material that covers the use of cyber fusion to detect advanced persistent threats (APTs) in different IT environments.

Last modified: 2023-01-15 16:02:06