hh.sePublications
System disruptions
We are currently experiencing disruptions on the search portals due to high traffic. We are working to resolve the issue, you may temporarily encounter an error message.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Threat hunting, definition and framework
Halmstad University.
Halmstad University.
2018 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

Being pioneers comes with advantages and responsibility. The concept of threathunting is currently being subsidized by businesses promoting their products. Additionally,there is little or no information regarding the implementation and theeffects, which vary depending on the organization. Threat hunting needed an unbiaseddefinition in accordance with employees in IT security. Consequently, theframeworks used when assessing threat hunting had to be objective. This thesispresents a definition of threat hunting, composed using impartial opinions. Furthermore,the thesis provides unique frameworks to assist when implementing andassessing threat hunting at an organization. This thesis has several areas of application:as a knowledge base for threat hunting, as the recommended practice forimplementing threat hunting and as groundwork for a more comprehensive evaluationof threat hunting capabilities. Ultimately, the thesis offers unprecedentednonpartisan information and recommendations on threat hunting.

Place, publisher, year, edition, pages
2018. , p. 81
Keywords [en]
Threat hunting
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:hh:diva-36759OAI: oai:DiVA.org:hh-36759DiVA, id: diva2:1205812
External cooperation
IKEA
Subject / course
Digital Forensics
Educational program
IT Forensics and Information Security, 180 credits
Supervisors
Examiners
Available from: 2018-05-24 Created: 2018-05-15 Last updated: 2018-05-24Bibliographically approved

Open Access in DiVA

fulltext(1695 kB)2802 downloads
File information
File name FULLTEXT02.pdfFile size 1695 kBChecksum SHA-512
f1711c54357f4e102376ab58e561ae5adff7723cef0a856e20154e77f4b29f85c455988bedf69f4e8029648f4cddde820f80c5c3102423388a11c257f271c604
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Liliengren, TheodorLöwenadler, Paul
By organisation
Halmstad University
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 2815 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 7865 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf