Someone else has already compiled the threat information - You can buy it
Threat intelligence services– Threat analytics– Correlation across different data sources
Constant threat monitoring– Identify new threats– Create automated prevention workflows
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Information-sharing organization
A
Public threat intelligence– Often classified information
Private threat intelligence– Private companies have extensive resources
Need to share critical security details– Real-time, high-quality cyber threat information sharing
Cyber Threat Alliance (CTA)– Members upload specifically formatted threat intelligence– CTA scores each submission and validates across other submissions– Other members can extract the validated data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Dark web intelligence
A
Dark web– Overlay networks that use the Internet– Requires specific software and configurations to access
Hacking groups and services– Activities– Tools and techniques– Credit card sales– Accounts and passwords
Monitor forums for activity– Company names, executive names