Cyber Threat Intelligence-Module 1-Aris Nicholas-1-17-2022-Rev
Cyber Threat Intelligence-Module 1-Aris Nicholas-1-17-2022-Rev
Cyber Threat Intelligence-Module 1-Aris Nicholas-1-17-2022-Rev
Protect
Collection & Processing
Enrichment & Analysis
Detect
Collaboration and Sharing-
Intelligence
Respond & Recover
Enrichment & Analysis-Update Image by: Webopedia. Threat Intelligence (2019, March)
response
Threat Intelligence Integration
FOUR TYPES OF CYBER THREAT INTELLIGENCE
OSINT Definition
How Is OSINT Used?
OSINT Techniques
OSINT Framework
OSINT Tools
THREAT INTELLIGENCE
TOOLS
Log Monitoring
Reporting For
Compliance
Analysis of Security
Events
Auto Responses to Image by DNS Stuff. 2021, September
Incidents
REFERENCE
Reference:
Stroud, Forrest (2019, March). Webopedia. Threat Intelligence
https://www.webopedia.com/definitions/threat-intelligence/
The Recorded Future Team (2019, February). RecordedFuture.com What Is Open-Source Intelligence and How Is it Used?
https://www.recordedfuture.com/open-source-intelligence-definition/
Staff Writer. (2020, September). DNS STUFF. What Is Threat Intelligence? Definition and Types
https://www.dnsstuff.com/what-is-threat-intelligence
Staff Writer. Zvelo. (2021). Website. Zvelo.com; Cyber Threat Intelligence: Planning and Direction
https://zvelo.com/cti-cyber-threat-intelligence/