Operationalizing threat intelligence a guide to developing and operationalizing cyber threat intelligence programs

Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program Key Features Develop and implement a threat intelligence program from scratch Discover techniques to perform cyber threat intelligence, collection, and analysis using open-source tools...

Descripción completa

Detalles Bibliográficos
Otros Autores: Wilhoit, Kyle, author (author), Opacki, Joseph, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing [2022]
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009668678306719
Tabla de Contenidos:
  • Table of Contents Why You Need a Threat Intelligence Program Threat Actors, Campaigns, and Tooling Guidelines and Policies Threat Intelligence Frameworks, Standards, Models, and Platforms Operational Security (OPSEC) Technical Threat Intelligence – Collection Technical Threat Analysis – Enrichment Technical Threat Analysis – Threat Hunting and Pivoting Technical Threat Analysis – Similarity Analysis Preparation and Dissemination Fusion into Other Enterprise Operations Overview of Datasets and Their Practical Application Conclusion.