Vulnerability Threat Intelligence

Threat intelligence is a domain within cybersecurity where teams leverage open source information to determine and prioritize threats to an organization. While commonly a separate practice in larger cybersecurity teams, smaller teams may leverage the same tactics to determine if there are known bad...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Hughes, Chris, Robinson, Nikki
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Threat intelligence is a domain within cybersecurity where teams leverage open source information to determine and prioritize threats to an organization. While commonly a separate practice in larger cybersecurity teams, smaller teams may leverage the same tactics to determine if there are known bad domains, IP addresses, types of files and file hashes, or specific vulnerabilities that are being exploited in the wild. All this technical information can be used to create alerts, detect possible ongoing attacks, or block unwanted network scanning from bad actors. Threat intelligence is also known as cyber threat intelligence and is used by multiple organizations, one example being the Cybersecurity and Infrastructure Security Agency. First, it's important to understand the various types of threat intelligence that are applicable to a vulnerability management program: technical, tactical, strategic, and operational. Incorporating threat intelligence into regular vulnerability management practices has so many incredible benefits.
DOI:10.1002/9781394277155.ch8