Publicado 2022
Tabla de Contenidos:
“…Diamond model of intrusion analysis framework -- How it works -- Use case - Diamond model of intrusion analysis -- Integrating the Diamond model into intelligence projects -- Benefits of the Diamond model -- Summary -- Chapter 4: Cyber Threat Intelligence Tradecraft and Standards -- Technical requirements -- The baseline of intelligence analytic tradecraft -- Note 1 - Addressing CTI consumers' interests -- Note 2 - Access and credibility -- Note 3 - Articulation of assumptions -- Note 4 - Outlook -- Note 5 - Facts and sourcing -- Note 6 - Analytic expertise -- Note 7 - Effective summary -- Note 8 - Implementation analysis -- Note 9 - Conclusions -- Note
10 - Tradecraft and counterintelligence -- Understanding and adapting ICD 203 to CTI -- Understanding the STIX standard -- Using STIX for cyber threat analysis -- Specifying threat indicator patterns using STIX -- Using the STIX standard for threat response management -- Threat intelligence information sharing -- Understanding the STIX v2 standard -- Understanding the TAXII standard -- How TAXII standard works --
AFI14-133 tradecraft standard for CTI -- Analytic skills and tradecraft -- Additional topics covered in
AFI14-133 -- Summary -- Chapter 5: Goal Setting, Procedures for CTI Strategy, and Practical Use Cases -- Technical requirements -- The threat intelligence strategy map and goal setting -- Objective 1 - Facilitate and support real-time security operations -- Objective 2 - Facilitate an effective response to cyber threats -- Objective 3 - Facilitate and support the proactive tracking of cyber threats -- Objective 4 - Facilitate and support the updating and implementation of security governance -- TIPs - an overview -- Commercial TIPs -- Open-source TIPs -- Case study 1 - CTI for Level 1 organizations -- Objective -- Strategy -- Example -- Case study 2 - CTI for Level 2 organizations…”
Número de Clasificación:
Cargando…
Ubicado:
Cargando…
Libro electrónico
Cargando…