O'Reilly logo

Building an Intelligence-Led Security Program by Allan Liska

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9

Advanced intelligence capabilities

Abstract

This chapter provides a high-level overview of three advanced security techniques: malware analysis, honeypots, and intrusion deception systems. Each technique is given an overview, discussing the pros and cons of implementing the solution and how they can improve the intelligence of the organization.

Keywords

Malware analysis
Honeypots
Honeynets
Honeytokens
intrusion deception
increasing the cost of attacks
sandboxes
Cuckoo
reverse engineering
Information in this chapter
Malware analysis
Honeypots
Intrusion deception systems

Introduction

Moving an organization from “Whack-a-Mole” security to intelligence-led security is a big challenge in and of itself. Taking the next step ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required