Il full-text non è disponibile per scelta dell'autore.
(
Contatta l'autore)
Abstract
Cyber threat intelligence, although not always considered on par with other enterprise intelligence concerns, is a cybersecurity discipline that can strongly influence the decision-making function and determine the success or failure of a business. In particular, the detection of corporate data leaks becomes crucial as more and more organizations find themself in the middle of their digital transformation process. Given the absence of a centralized and structured approach to this sub-field of cybersecurity intelligence, companies often are little more than at the mercy of cyber criminals, who are instead backed by exclusive communities on the Dark Web. This thesis represents an attempt to provide a framework and a set of implementation guidelines for building a proper intelligence system rooted in the Dark Web and devoted to the detection of corporate data leaks. The theoretical work is enriched with the empirical evidence and technical accomplishments developed specifically for a case study inside Grant Thornton Digital.
Abstract
Cyber threat intelligence, although not always considered on par with other enterprise intelligence concerns, is a cybersecurity discipline that can strongly influence the decision-making function and determine the success or failure of a business. In particular, the detection of corporate data leaks becomes crucial as more and more organizations find themself in the middle of their digital transformation process. Given the absence of a centralized and structured approach to this sub-field of cybersecurity intelligence, companies often are little more than at the mercy of cyber criminals, who are instead backed by exclusive communities on the Dark Web. This thesis represents an attempt to provide a framework and a set of implementation guidelines for building a proper intelligence system rooted in the Dark Web and devoted to the detection of corporate data leaks. The theoretical work is enriched with the empirical evidence and technical accomplishments developed specifically for a case study inside Grant Thornton Digital.
Tipologia del documento
Tesi di laurea
(Laurea magistrale)
Autore della tesi
Pieri, Nicola
Relatore della tesi
Scuola
Corso di studio
Ordinamento Cds
DM270
Parole chiave
Cyber Threat Intelligence,Cybersecurity,Dark Web,Deep Web,Business Intelligence,Digital Transformation,Data Leak,Data Breach
Data di discussione della Tesi
20 Dicembre 2023
URI
Altri metadati
Tipologia del documento
Tesi di laurea
(NON SPECIFICATO)
Autore della tesi
Pieri, Nicola
Relatore della tesi
Scuola
Corso di studio
Ordinamento Cds
DM270
Parole chiave
Cyber Threat Intelligence,Cybersecurity,Dark Web,Deep Web,Business Intelligence,Digital Transformation,Data Leak,Data Breach
Data di discussione della Tesi
20 Dicembre 2023
URI
Gestione del documento: