Cyber Threat Intelligence (CTI) using Dark Web / (Record no. 610453)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01734nam a22001457a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | NUST |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8,RAZ |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Raza, Ali |
| 9 (RLIN) | 19808 |
| 245 ## - TITLE STATEMENT | |
| Title | Cyber Threat Intelligence (CTI) using Dark Web / |
| Statement of responsibility, etc. | GC Ali Raza, GC Afzaal Ahmed, GC Abdullah Sallah. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | MCS, NUST |
| Name of publisher, distributor, etc. | Rawalpindi |
| Date of publication, distribution, etc. | 2024 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 65 p |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | In an era characterized by digital warfare, organizations around the world are engaged in a never-ending conflict with constantly changing cyber threats. A hidden area of internet known as the dark web, has become a center for illegal activity, such as the tools used by illicit actors and the sharing of sensitive information. As a component of cybersecurity, CTI helps identify and reduce risks that arise from the undiscovered areas of the internet. Other than data collection, CTI's significance lies in developing tools and techniques to extract useful information from the wide range of online platforms, markets, and encrypted communication channels.<br/>The quantity of Internet of Things devices made possible by hackers increases the likelihood of exploitation through hacker resources. These hackers’ resources can be shared among communities of threat actors on the Dark web. Despite rising curiosity in the Dark web there remains uncertainty about the extent and volume of hacker resources that can be uncovered.<br/>In today's digital era rife with cyber threats CTI acts as a defense against entities intent on leveraging vulnerabilities, for illicit purposes. By utilizing technology and insights, from data analysis CTI professionals work to protect assets and maintain the authenticity of digital environments. |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Supervisor Dr. Faisal Amjad |
| 9 (RLIN) | 124649 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | |
| Koha item type | Project Report |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Military College of Signals (MCS) | Military College of Signals (MCS) | General Stacks | 07/20/2024 | 005.8,RAZ | MCSPIS-5 | 07/20/2024 | 07/20/2024 | Project Report |
