Jian is a member of the security team at Trinity, Inc. He was conducting a real-time assessment of system activities in order to acquire threat intelligence feeds. He acquired feeds from sources like honeynets, P2P monitoring. infrastructure, and application logs.
Which of the following categories of threat intelligence feed was acquired by Jian?
Internal intelligence feeds are derived from data and information collected within an organization's own networks and systems. Jian's activities, such as real-time assessment of system activities and acquiring feeds from honeynets, P2P monitoring, infrastructure, and application logs, fall under the collection of internal intelligence feeds. These feeds are crucial for identifying potential threats and vulnerabilities within the organization and form a fundamental part of a comprehensive threat intelligence program. They contrast with external intelligence feeds, which are sourced from outside the organization and include information on broader cyber threats, trends, and TTPs of threat actors. Reference:
'Building an Intelligence-Led Security Program' by Allan Liska
'Threat Intelligence: Collecting, Analysing, Evaluating' by M-K. Lee, L. Healey, and P. A. Porras
Maurine
2 months agoSalena
2 months agoPaul
3 months agoLawrence
3 months agoReynalda
3 months agoRashida
3 months agoTrina
4 months agoFannie
4 months agoRonald
4 months agoJesusa
4 months agoTruman
4 months agoLavonne
5 months agoLilli
5 months agoBethanie
7 months agoDominic
7 months agoTamesha
6 months agoElli
7 months agoDeandrea
7 months agoCristy
7 months agoLavonna
7 months agoNoel
8 months agoFatima
8 months agoNathalie
6 months agoJudy
6 months agoAlishia
7 months agoMan
7 months agoDalene
7 months agoWhitley
7 months agoFrance
8 months agoMicaela
8 months agoGail
7 months agoSolange
7 months agoTrinidad
7 months ago