CHAPTER 2
Threat Intelligence in Support of Organizational Security
In this chapter you will learn:
• Types of threat intelligence
• Attack frameworks and their use in leveraging threat intelligence
• Threat modeling methodologies
• How threat intelligence is best used in other security functions
By “intelligence” we mean every sort of information about the enemy and his country—the basis, in short, of our own plans and operations.
—Carl von Clausewitz
Depending on the year and locale, fire departments may experience around a 10 percent false alarm rate resulting from accidental alarm tripping, hardware malfunction, and nuisance behavior. Given the massive amount of resources required for a response and the scarce and specialized nature ...
Get CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.