-
Book Overview & Buying
-
Table Of Contents
Mastering Cyber Intelligence
By :
When executing a threat intelligence program, it is essential to have a set of criteria to determine its contribution to the overall system security and business. It means that the Cyber Threat Intelligence (CTI) analysts or team must select security intelligence metrics that will justify the program's existence, be it on the strategic, operational, or tactical level.
As CTI analysts, we always look for pieces of threat or breach evidence in the system to analyze security exposure and adversaries' activities. And those pieces of evidence are what make threat intelligence actionable. They are known as Indicators of Compromise (IOCs). Adversaries use many IOCs, and how we, analysts, respond to them will determine the level of pain it will cause those adversaries to reach their malicious objectives. This chapter focuses on security metrics for intelligence evaluation and the measurement...
Change the font size
Change margin width
Change background colour