- Mastering Kali Linux for Advanced Penetration Testing(Second Edition)
- Vijay Kumar Velu
- 193字
- 2021-07-02 21:04:17
Threat intelligence
Threat intelligence is controlled, calculated, and refined information about potential or current attacks that threaten an organization. The primary purpose of this kind of intelligence is to ensure organizations are aware of the current risks, such as Advanced Persistent Threats (APTs), Zero Day exploits, and other severe external threats, such as information about a million credit cards being stolen from retail Company A through APTs, and this alert being already passed on to Company B to step up their security.
However, it is most likely that organizations take a very long time to make an actionable decision due to a lack of trusted sources, and also the cost involved due to the nature and probability of the threats. In the preceding example, Company B may have 2,000 stores to replace, or may have to halt all transactions.
This information can be potentially utilized by attackers to exploit the network. However, this information is considered to be a passive reconnaissance activity since there has, as yet, been no direct attack launched on the target.
Penetration testers or attackers will always subscribe to open source threat intelligence frameworks, such as STIX and TAXII.
- Java完全自學教程
- Visual C++數字圖像模式識別技術詳解
- Git高手之路
- WordPress Plugin Development Cookbook(Second Edition)
- 運用后端技術處理業務邏輯(藍橋杯軟件大賽培訓教材-Java方向)
- Protocol-Oriented Programming with Swift
- MongoDB,Express,Angular,and Node.js Fundamentals
- Learning Unreal Engine Android Game Development
- JavaScript+jQuery網頁特效設計任務驅動教程
- 零基礎學Python編程(少兒趣味版)
- Python計算機視覺與深度學習實戰
- HTML5 WebSocket權威指南
- INSTANT PLC Programming with RSLogix 5000
- 深入大型數據集:并行與分布化Python代碼
- Practical Responsive Typography