July 2018
Intermediate to advanced
356 pages
9h 18m
English
The purpose of threat intelligence is to help an organization to prepare for known and unknown threats. To address the unknown threats, the external threat feeds can be used to identify whether the existing environment may have similar threats, and also be used to optimize the security detection rules. For example, a known cybercrime IP or the Tor exit IP can be used to block the outbound connection IP lists in the firewall.
Integrate the internal threat log information, and the external threat feeds will help to combine the known and unknown threats and take proactive steps. The whole threat intelligence process normally includes the following key components: