CHAPTER 2
Threat Intelligence in Support of Organizational Security
This chapter includes questions on the following topics:
• Types of threat intelligence
• Attack frameworks and their use in leveraging threat intelligence
• Threat modeling methodologies
• How threat intelligence is best used in other security functions
Threat is a mirror of security gaps. Cyber-threat is mainly a reflection of our weaknesses.
–Stèphane Nappo
Based on recent studies, an increasing number of organizations believe that participation in threat intelligence sharing improves cybersecurity posture. One of the benefits from this participation is believed to be an increased ability to detect, contain, and respond to security incidents. Automation has been ...
Get CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.