Friday, March 6, 2020

Threat Intelligence Lifecycle


The intelligence lifecycle is a process to transform raw information into finished intelligence for decision making and action. You will see many slightly different versions of the intelligence cycle in your research,  but the goal is the same, to guide a cybersecurity team through the development and execution of an effective threat intelligence program.

Threat intelligence is challenging because threats are constantly evolving requiring business to quickly adapt and take decisive action. The intelligence cycle provides a framework to enable teams to optimize their resources and effectively respond to the modern threat landscape. The intelligence cycle consists of six steps resulting in a feedback loop to encourage continuous improvement:
Let’s explore the 6 steps below:

1. Requirements

The requirements stage is crucial to the threat intelligence lifecycle because it sets the roadmap for a specific threat intelligence operation. During this planning stage, the team will agree on the goals and methodology of their intelligence program based on the needs of the stakeholders involved. The team may set out to discover:
  • who the attackers are and their motivations
  • what is the attack surface
  • what specific actions should be taken to strengthen their defenses against a future attack


2. Collection

Once the requirements are defined, the team then sets out to collect the data required to satisfy those objectives. Depending on the goals, the team will usually seek out traffic logs, publicly available sources, relevant forums, social media, and industry or subject matter experts.

3. Processing

After the raw data has been collected, it will have to be processed into a format suitable for analysis. Most of the time, this entails organizing data points into spreadsheets, decrypting files, translating information from foreign sources, and evaluating the data for relevance and reliability.

4. Analysis

Once the dataset has been refined, the team must then conduct a thorough analysis to find answers to the questions posed in the requirements phase. During the analysis phase, the team also works to decipher the dataset into action items and valuable recommendations for the stakeholders.

5. Dissemination

The dissemination phase requires the threat intelligence team to translate their analysis into a digestible format and present the results to the stakeholders. How the analysis is presented depends on the audience. In most cases the recommendations should be presented concisely, without confusing technical jargon, either in a one-page report or a short slide deck.

6. Feedback

The final stage of the threat intelligencelifecycle involves getting feedback on the provided report to determine whether adjustments need to be made for future threat intelligence operations. Stakeholders may have changes to their priorities, the cadence at which they wish to receive intelligence reports, or how data should be disseminated or presented.

9 comments:

  1. It is by all accounts Xbox 360, website designer uae that has better security administrations. The explanation I state that is a direct result of the ongoing PS3 security emergency. In the event that you don't think about it, the PS3 servers were hacked and closed down. A large number of paying clients had their charge card numbers taken in light of the fact that their numbers were put away on the reassure. After this, the PS3 online servers were closed down for about a month while Sony attempted to recoup from the interruption

    ReplyDelete
  2. So I need to sell my garments on poshmark, web design uae however I'm not satisfactory on how I would dispatch things? Does anybody have experience selling things on the web? Is it costly to transport things? Like more than 10.00? I mean I would prefer not to spend such a great amount for no benefit. Is fedex, ups, or standard mail better? I likewise need to sell a few books on amazon? I truly need somebody to explain the entire transportation technique before I start.

    ReplyDelete
  3. A comptuer can just do, Pakistani Party wear what it is modified to do. It will react to any outer improvement with an answer that has been pre-arranged for it to give. It responds. Give it a circumstance and it will decide the best strategy... in any case, just as indicated by recently modified headings.

    ReplyDelete
  4. Lion fledglings are brought into the world visually impaired, in litters of two to four. (Litters up to nine have been accounted for, Cheap web designer yet odds of more than four survivng are low, in light of the fact that the mother has only four nipples.) They are commonly around 1 foot (30.5 cm.) long and weigh about a pound (.45 Kg.)

    ReplyDelete
  5. Chlamydiae are commit intracellular ,low cost website design dubai price in australia bacterial pathogens, which implies they can't duplicate outside of a host cell. In any case, to disperse successfully, these pathogens have developed a one of a kind biphasic life cycle wherein they shift back and forth between two practically and morphologically particular structures.

    ReplyDelete
  6. The information is so much useful and knowledgeable. WordPress web design Thanks for sharing it with us. your post are so amazing. keep it up.

    ReplyDelete
  7. The information is so much useful and knowledgeable. SEO agency in australia Thanks for sharing it with us. your post are so amazing. keep it up.

    ReplyDelete
  8. the Telecom Corner blogs are so amazing to read website designer uae your blog post provides so many information. thanks for sharing it with us

    ReplyDelete

Threat Intelligence Lifecycle

The intelligence lifecycle is a process to transform raw information into finished intelligence for decision making and action. You will ...