Help ?

IGMIN: We're glad you're here. Please click 'create a new query' if you are a new visitor to our website and need further information from us.

If you are already a member of our network and need to keep track of any developments regarding a question you have already submitted, click 'take me to my Query.'

Search

Organised by  IgMin Fevicon

Regional sites

Browse by Subjects

Welcome to IgMin Research – an Open Access journal uniting Biology, Medicine, and Engineering. We’re dedicated to advancing global knowledge and fostering collaboration across scientific fields.

Members

We seek to inspire dialogues that bring together experts from diverse fields to expedite research.

Articles

We seek to inspire dialogues that bring together experts from diverse fields to expedite research.

Explore Content

We seek to inspire dialogues that bring together experts from diverse fields to expedite research.

Identify Us

We seek to inspire dialogues that bring together experts from diverse fields to expedite research.

IgMin Corporation

Welcome to IgMin, a leading platform dedicated to enhancing knowledge dissemination and professional growth across multiple fields of science, technology, and the humanities. We believe in the power of open access, collaboration, and innovation. Our goal is to provide individuals and organizations with the tools they need to succeed in the global knowledge economy.

Publications Support
[email protected]
E-Books Support
[email protected]
Webinars & Conferences Support
[email protected]
Content Writing Support
[email protected]
IT Support
[email protected]

Search

Select Language

Explore Section

Content for the explore section slider goes here.

Abstract

Abstract at IgMin Research

We seek to inspire dialogues that bring together experts from diverse fields to expedite research.

Engineering Group Research Article Article ID: igmin169

Cyber Threat Analysis (CTA) in Current Conflicts

Cybersecurity Information TechnologyData Engineering DOI10.61927/igmin169 Affiliation

Affiliation

    Sławomir Żurawski, PhD, State Academy of Applied Sciences, Chełm, Poland, Email: [email protected]

5.1k
VIEWS
657
DOWNLOADS
Connect with Us

Abstract

Cyber Threat Analysis (CTA) in current conflicts focuses on identifying, monitoring, and assessing potential cyber threats. The main objective is to understand how the parties to the conflict use information and network technologies to conduct warfare, espionage, disinformation, or attacks on digital infrastructure. This analysis includes the identification of actors involved in conflicts and their targets in cyberspace, as well as the analysis of techniques and tools used in cyber activities. The aim of the article is to identify the role of cyber threat analysis in the context of two current conflicts - the war in Ukraine and the Hamas attack on Israel. The article describes the essence of cyber threat analysis. The research problem focuses on identifying and understanding the role of cyber threat analysis in these conflicts and their potential consequences for international security and regional stability. Through the analysis of reports, online sources, and scientific literature, the article aims to familiarize readers with the role of cyber threat analysis in the context of these conflicts and to propose possible strategies for cyber risk management in the face of contemporary armed conflicts. The results of the analysis of cyber threats (CTA) in current conflicts include the identification of specific actors operating in cyberspace, their modus operandi, their objectives, and the techniques and tools used. In addition, the analysis can reveal existing vulnerabilities in digital security and areas that are particularly vulnerable to attacks. To sum up, it is necessary to create recommendations and directions for changes regarding the strengthening of digital security measures, such as software updates, implementation of network security, and increasing staff awareness of cyber threats. In addition, the CTA may suggest the need for better international cooperation to combat cyber threats and the need to develop strategies to prevent and respond to cyber-attacks.

Figures

References

    1. Strike C. What is Cyber Threat Intelligence? crowdstrike.com. 2024, April 3. https://www.crowdstrike.com/cybersecurity-101/threat-intelligence/
    2. Dehghantanha M. Dargahi CT. Cyber Threat Intelligence: Challenges and Opportunities. Advances in Information Security, ADIS. 2018; 70:1-6.
    3. Wagner TD, Mahbub K, Palomar E, Abdallah AE. Cyber threat intelligence sharing: Survey and research directions, Computers & Security. 2019; 87.
    4. ENISA Threat Landscape 2020 - Cyber threat intelligence overview. ENISA. 2020, October 20. https://www.enisa.europa.eu/publications/cyberthreat-intelligence-overview
    5. What is Cyber Threat Intelligence? 2024, April 3. https://www.crowdstrike.com/cybersecurity
    6. Fonseca M. SANS 2023 CTI Survey shows cyber threat intelligence is taking root. Silobreaker. 2023, December 11. https://www.silobreaker.com/blog/sans-2023-cti-survey-shows-cyber-threat-intelligence-is-taking-root/
    7. The Economist. Will war in Ukraine lead to a wider cyber-conflict? The Economist. 2022, February 24. https://www.economist.com/europe/2022/02/23/will-war-in-ukraine-lead-to-a-wider-cyber-conflict?
    8. Grossman T, Kaminska M, Shires J, Smeets M. The Cyber Dimensions of the Russia-Ukraine War, European Cyber Conflict Research Initiative. April 2023.
    9. Global Threat Report 2024. 2024. https://www.crowdstrike.com/cybersecurity-101/threat-intelligence/

Similar Articles

Preventing Chronic Pain: Solutions to a Public Health Crisis
James Fricton, Karen Lawson, Robert Gerwin and Sarah Shueb
DOI10.61927/igmin282
Evaluating Digital Imaging Technologies for Anogenital Injury Documentation in Sexual Assault Cases
Jon Giolitti, Abbigail Behmlander, Sydney Brief, Emma Dixon, Sydney Hudock, Linda Rossman, Stephanie Solis, Meredith Busman, Lisa Ambrose, Lindsey Ouellette and Jeffrey Jones
DOI10.61927/igmin246
Screening for Sexually Transmitted Infections in Adolescents with Genitourinary Complaints: Is There a Still Role for Endocervical Gram Stains?
Subah Nanda, Amanda Schoonover, Jasman Kaur, Annie Vu, Erica Tavares, Angela Zamarripa, Christian Kolacki, Lindsey Ouellette and Jeffrey Jones
DOI10.61927/igmin251
Investigation of Lateral Vibrations in Turbine-generator Unit 5 of the Inga 2 Hydroelectric Power Plant
André Mampuya Nzita, Edmond Phuku Phuati, Robert Muanda Ngimbi, Guyh Dituba Ngoma and Nathanaël Masiala Mavungu
DOI10.61927/igmin173

Why publish with us?

  • Global Visibility – Indexed in major databases

  • Fast Peer Review – Decision within 14–21 days

  • Open Access – Maximize readership and citation

  • Multidisciplinary Scope – Biology, Medicine and Engineering

  • Editorial Board Excellence – Global experts involved

  • University Library Indexing – Via OCLC

  • Permanent Archiving – CrossRef DOI

  • APC – Affordable APCs with discounts

  • Citation – High Citation Potential

Submit Your Article

Advertisement