- Mastering Kali Linux for Advanced Penetration Testing(Second Edition)
- Vijay Kumar Velu
- 193字
- 2021-07-02 21:04:17
Threat intelligence
Threat intelligence is controlled, calculated, and refined information about potential or current attacks that threaten an organization. The primary purpose of this kind of intelligence is to ensure organizations are aware of the current risks, such as Advanced Persistent Threats (APTs), Zero Day exploits, and other severe external threats, such as information about a million credit cards being stolen from retail Company A through APTs, and this alert being already passed on to Company B to step up their security.
However, it is most likely that organizations take a very long time to make an actionable decision due to a lack of trusted sources, and also the cost involved due to the nature and probability of the threats. In the preceding example, Company B may have 2,000 stores to replace, or may have to halt all transactions.
This information can be potentially utilized by attackers to exploit the network. However, this information is considered to be a passive reconnaissance activity since there has, as yet, been no direct attack launched on the target.
Penetration testers or attackers will always subscribe to open source threat intelligence frameworks, such as STIX and TAXII.
- Learning Scala Programming
- Hadoop+Spark大數據分析實戰
- Python編程完全入門教程
- 信息技術應用基礎
- 零基礎學單片機C語言程序設計
- INSTANT Sinatra Starter
- 西門子S7-200 SMART PLC編程從入門到實踐
- Mastering C++ Multithreading
- Microsoft 365 Certified Fundamentals MS-900 Exam Guide
- Java RESTful Web Service實戰
- 金融商業數據分析:基于Python和SAS
- 從零開始學UI設計·基礎篇
- C語言程序設計
- Internet of Things with Arduino Cookbook
- jQuery EasyUI從零開始學