Advanced intelligence capabilities
Abstract
This chapter provides a high-level overview of three advanced security techniques: malware analysis, honeypots, and intrusion deception systems. Each technique is given an overview, discussing the pros and cons of implementing the solution and how they can improve the intelligence of the organization.
Keywords
Introduction
Get Building an Intelligence-Led Security Program now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.