From the course: Ethical Hacking: Introduction to Ethical Hacking

Unlock the full course today

Join today to access over 22,700 courses taught by industry experts or purchase this course individually.

Solution: Cyber threat information sharing

Solution: Cyber threat information sharing

From the course: Ethical Hacking: Introduction to Ethical Hacking

Start my 1-month free trial

Solution: Cyber threat information sharing

- [Narrator] Okay. Now let's check our work. In this response, we'll review key elements of NIST, Special Publication 801-50. First, we'll define the five main types of threat information. Indicators represent forensic evidence, such as IP addresses or suspicious domain names, that a cyber threat may have infiltrated a system. Tactics, techniques and procedures are the methods and approaches used by a malicious actor during an attack. Security alerts are technical notifications regarding current vulnerabilities, exploits, or other security issues. Threat intelligence reports describe actors, types of systems being targeted, along with other threat related information. And tool configurations are recommendations for setting up and using tools that support the automated collection, exchange, processing, analysis, and use of threat information. Next, we'll list and define the four main benefits of sharing threat information. One, is shared situational awareness, which helps organizations…

Contents