問題一覧
1
The Threat Intelligence Cycle | ok
2
- Intelligence
3
- A concept, - A Approach
4
- Feel Knowledge Gaps., - Establish well structured set of information., - Used to make smart decisions about Security.
5
- Firewalls to buy., - Where to deploy technical appliances., - System that requires patching.
6
- Planning and Requirements., - Collection and Processing., - Analysis., - Dissemination., - Feedback.
7
- Planning and Requirements
8
- Why are we doing it?, - What’s our goal?
9
- Business Requirements
10
- Legal Restrictions.
11
- Most likely threats.
12
- Having a starting point.
13
- Collection and Processing
14
- To gather information., - In an Organized Manner., - With a focus on keeping information consistent.
15
- Automated Practices.
16
- Laptops., - Mobile Devices., - Switches., - Firewalls., - Servers., - Applications., - Cloud.
17
- Processing and Normalization.
18
- Analysis.
19
- Transform raw, collected data., - into meaningful, actionable intelligence. , - Bridge gap between., - Gathering information., - and using it to make informed security decisions.
20
- Automation., - Scripts:, - Bash., - Python., - PowerShell., - S.I.E.M. Systems., - Stands for Security Information and Event Management., - Manual input ( Least Recommended)
21
- Process of linking and analyzing., - Different pieces of raw data., - To uncover hidden connections and patterns.
22
- Transforms raw information., - From various sources., - Into actionable intelligence.
23
- Dissemination.
24
- Deliver finished, actionable intelligence., - To the right people at the right time., - Transform technical analysis into. - A usable product that. - Drives security decisions and actions.
25
- All audiences, audiences including:, - Multiple People, Multiple Levels /, - Tech People ( Configuration of Devices, Respond to Incidence ), - Upper Management , - C.E.O. Level
26
- Conmunicating the same findings., - Communicating the same ideas., - To Multiple Audiences.
27
- Different Sector., - Different Findings, - Ex. |, - Security Analysis Report, - Different from., - C.E.O Report
28
- Strategic Intelligence. , - Operational Intelligence., - Tactical Intelligence.
29
- Strategic Objectives.
30
- Addresses Long Term Objective., - Addresses Priorities.
31
- Operational Intelligence.
32
- Day to Day Priorities of I.T. ( Security Specialists/ as well as managers ), - Focused on Short term objectives.
33
- Tactical Intelligence.
34
- Real Time ( Shortest Term Objectives ), - Intelligence that requires immediate action., - Tasks that needed to be ready yesterday.
35
- Continously improve processes., - This is a repetitive phase., - For that to happen, this requires the 5th Phase ‘ Feedback ‘, within the Threat Intelligence Cycle.
36
- Feedback.
37
- Not about providing feedback to you collides., - This is about., - Feeding information back into the Threat Intelligence Cycle.
38
- New Findings, New Information., - Lessons Learned:.., - What went right, what went wrong., - Lessons learned from the previous steps., - Did you discover anything new, since last time., - Any new Threats out there?., - New Risks., - New Threats., - Something new you should be doing.
39
- End phase with clear list of tasks., - For a Clear List Of People., - That are responsible for making your Threat Intelligence Cycle.
40
- Know and Understand. , - All Phases of Threat Intelligence Cycle., - Possibly Questions of how., - Which activity to belonging to which phase of the cycle.
examen Alexandru
examen Alexandru
ユーザ名非公開 · 40問 · 7日前examen Alexandru
examen Alexandru
40問 • 7日前COMPUTER 2ND QUARTER
COMPUTER 2ND QUARTER
Karla Marie Ybañez · 38問 · 4ヶ月前COMPUTER 2ND QUARTER
COMPUTER 2ND QUARTER
38問 • 4ヶ月前History and Discovery of Microorganisms
History and Discovery of Microorganisms
HERSHEY VALERIE BERNARDINO · 80問 · 4ヶ月前History and Discovery of Microorganisms
History and Discovery of Microorganisms
80問 • 4ヶ月前Introduction to Computing
Introduction to Computing
ユーザ名非公開 · 19問 · 4ヶ月前Introduction to Computing
Introduction to Computing
19問 • 4ヶ月前4.1
4.1
Sab Sescon · 34問 · 4ヶ月前4.1
4.1
34問 • 4ヶ月前Data and Digital Communication Mocktest (Prelim) BSIT 505
Data and Digital Communication Mocktest (Prelim) BSIT 505
Xai Alexandrei Delos Reyes · 60問 · 4ヶ月前Data and Digital Communication Mocktest (Prelim) BSIT 505
Data and Digital Communication Mocktest (Prelim) BSIT 505
60問 • 4ヶ月前css
css
En. km · 33問 · 5ヶ月前css
css
33問 • 5ヶ月前Css 3 quiz
Css 3 quiz
En. km · 36問 · 5ヶ月前Css 3 quiz
Css 3 quiz
36問 • 5ヶ月前21 ) SY EX. 5 | COMPLETE
21 ) SY EX. 5 | COMPLETE
The R.S.S.H Delivery Company · 91問 · 5ヶ月前21 ) SY EX. 5 | COMPLETE
21 ) SY EX. 5 | COMPLETE
91問 • 5ヶ月前SY EX | 4 MASTER | notCOMPLETE
SY EX | 4 MASTER | notCOMPLETE
The R.S.S.H Delivery Company · 90問 · 5ヶ月前SY EX | 4 MASTER | notCOMPLETE
SY EX | 4 MASTER | notCOMPLETE
90問 • 5ヶ月前SY EX | 2 MASTER
SY EX | 2 MASTER
The R.S.S.H Delivery Company · 333問 · 6ヶ月前SY EX | 2 MASTER
SY EX | 2 MASTER
333問 • 6ヶ月前The OSI Model and Encapsulation
The OSI Model and Encapsulation
ユーザ名非公開 · 12問 · 6ヶ月前The OSI Model and Encapsulation
The OSI Model and Encapsulation
12問 • 6ヶ月前15 ) EX. 14 | COMPLETE
15 ) EX. 14 | COMPLETE
The R.S.S.H Delivery Company · 90問 · 6ヶ月前15 ) EX. 14 | COMPLETE
15 ) EX. 14 | COMPLETE
90問 • 6ヶ月前セキュリティ
セキュリティ
akari · 30問 · 8ヶ月前セキュリティ
セキュリティ
30問 • 8ヶ月前いんふぉるまちおん
いんふぉるまちおん
かわまた · 89問 · 11ヶ月前いんふぉるまちおん
いんふぉるまちおん
89問 • 11ヶ月前LETP TEST
LETP TEST
tanner · 92問 · 11ヶ月前LETP TEST
LETP TEST
92問 • 11ヶ月前competenence 9
competenence 9
Leodegario Almaden jr. · 100問 · 11ヶ月前competenence 9
competenence 9
100問 • 11ヶ月前Plumbing Arithmetic Terms 3
Plumbing Arithmetic Terms 3
Vaantoote · 49問 · 1年前Plumbing Arithmetic Terms 3
Plumbing Arithmetic Terms 3
49問 • 1年前An Ninh Vip Pro 2
An Ninh Vip Pro 2
Ngọc Bích Trần · 40問 · 1年前An Ninh Vip Pro 2
An Ninh Vip Pro 2
40問 • 1年前HPC 102 FINALS
HPC 102 FINALS
Leah Jean Better · 27問 · 1年前HPC 102 FINALS
HPC 102 FINALS
27問 • 1年前問題一覧
1
The Threat Intelligence Cycle | ok
2
- Intelligence
3
- A concept, - A Approach
4
- Feel Knowledge Gaps., - Establish well structured set of information., - Used to make smart decisions about Security.
5
- Firewalls to buy., - Where to deploy technical appliances., - System that requires patching.
6
- Planning and Requirements., - Collection and Processing., - Analysis., - Dissemination., - Feedback.
7
- Planning and Requirements
8
- Why are we doing it?, - What’s our goal?
9
- Business Requirements
10
- Legal Restrictions.
11
- Most likely threats.
12
- Having a starting point.
13
- Collection and Processing
14
- To gather information., - In an Organized Manner., - With a focus on keeping information consistent.
15
- Automated Practices.
16
- Laptops., - Mobile Devices., - Switches., - Firewalls., - Servers., - Applications., - Cloud.
17
- Processing and Normalization.
18
- Analysis.
19
- Transform raw, collected data., - into meaningful, actionable intelligence. , - Bridge gap between., - Gathering information., - and using it to make informed security decisions.
20
- Automation., - Scripts:, - Bash., - Python., - PowerShell., - S.I.E.M. Systems., - Stands for Security Information and Event Management., - Manual input ( Least Recommended)
21
- Process of linking and analyzing., - Different pieces of raw data., - To uncover hidden connections and patterns.
22
- Transforms raw information., - From various sources., - Into actionable intelligence.
23
- Dissemination.
24
- Deliver finished, actionable intelligence., - To the right people at the right time., - Transform technical analysis into. - A usable product that. - Drives security decisions and actions.
25
- All audiences, audiences including:, - Multiple People, Multiple Levels /, - Tech People ( Configuration of Devices, Respond to Incidence ), - Upper Management , - C.E.O. Level
26
- Conmunicating the same findings., - Communicating the same ideas., - To Multiple Audiences.
27
- Different Sector., - Different Findings, - Ex. |, - Security Analysis Report, - Different from., - C.E.O Report
28
- Strategic Intelligence. , - Operational Intelligence., - Tactical Intelligence.
29
- Strategic Objectives.
30
- Addresses Long Term Objective., - Addresses Priorities.
31
- Operational Intelligence.
32
- Day to Day Priorities of I.T. ( Security Specialists/ as well as managers ), - Focused on Short term objectives.
33
- Tactical Intelligence.
34
- Real Time ( Shortest Term Objectives ), - Intelligence that requires immediate action., - Tasks that needed to be ready yesterday.
35
- Continously improve processes., - This is a repetitive phase., - For that to happen, this requires the 5th Phase ‘ Feedback ‘, within the Threat Intelligence Cycle.
36
- Feedback.
37
- Not about providing feedback to you collides., - This is about., - Feeding information back into the Threat Intelligence Cycle.
38
- New Findings, New Information., - Lessons Learned:.., - What went right, what went wrong., - Lessons learned from the previous steps., - Did you discover anything new, since last time., - Any new Threats out there?., - New Risks., - New Threats., - Something new you should be doing.
39
- End phase with clear list of tasks., - For a Clear List Of People., - That are responsible for making your Threat Intelligence Cycle.
40
- Know and Understand. , - All Phases of Threat Intelligence Cycle., - Possibly Questions of how., - Which activity to belonging to which phase of the cycle.