An organization hired a network operations center (NOC) team to protect its IT infrastructure from external attacks. The organization utilized a type of threat intelligence to protect its resources from evolving threats. The threat intelligence helped the NOC team understand how attackers are expected to perform an attack on the organization, identify the information leakage, and determine the attack goals as well as attack vectors.
Identify the type of threat intelligence consumed by the organization in the above scenario.
Success audit is the type of event that Brielle identified in the above scenario. Success audit is a type of event that records successful attempts to access a network device or resource. Success audit can be used to monitor authorized activities on a network, but it can also indicate unauthorized activities by malicious actors who have compromised credentials or bypassed security controls4.
Ezekiel
18 days agoAlishia
15 hours agoJanet
19 days agoLaticia
1 months agoArletta
18 hours agoMerri
16 days agoLucy
20 days agoBrinda
1 months agoMiesha
27 days agoLina
1 months agoKaitlyn
2 months agoTiara
2 months agoGlendora
2 months agoDeeanna
2 months agoNan
2 months agoMaybelle
2 months ago