GithubHelp home page GithubHelp logo

qeeqbox / threat-intelligence Goto Github PK

View Code? Open in Web Editor NEW
8.0 1.0 0.0 187 KB

Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, and future cyber threats (Collecting information about a potential threat, then analyzing that information to learn more about the negative events)

License: GNU Affero General Public License v3.0

cycle infosecsimplified threat-intelligence qeeqbox

threat-intelligence's Introduction

Threat Intelligence

Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, and future cyber threats (Collecting information about a potential threat, then analyzing that information to learn more about the negative events)


Threat Intelligence Types

  • Tactical Threat Intelligence
    • Addresses the what (Focuses on threat actor tactics, techniques, and procedures TTPs)
      • Scenario
        • You receive malware alerts from TIP, and the sigs get digested automatically by the endpoint security server, the server pushes the new sigs to endpoint clients
      • Examples
        • Malware hash
        • URLs
        • IPs
      • Collected from
        • Dark web
        • Public reports
      • Used for
        • SIEM
        • Firewall
        • Endpoints
        • IDS/IPS
        • SOC
  • Operational Threat Intelligence
    • Addresses the how and where (Focuses on how and where a threat happen/happened)
      • Scenario
        • You receive an alert about a newly discovered MFA bypass vulnerability in a specific software. The software is currently being used by the company you work for, you patched the vulnerability and keep an eye on it by creating detection rules
      • Collected from
        • Dark web forums
        • Private forums
        • Social networks
      • Used by
        • Defenders
        • Malware Analysts
        • IR
        • SOC
        • CISO
        • CIO
      • Used for
        • Prevent or respond to attacks
        • Identify possible attacks
        • Prioritize updates
        • Gain deep understanding of attacks
  • Strategic Threat Intelligence
    • Addresses the who and why (Focuses on identifying the threat actor behind the threat and why the origination is being targeted)
      • Scenario
        • You receive an alert about a ransom gang targeting higher education institutions; you work for a higher education institution and could be a target of that Ransom gang; the higher education institution decided to implement stronger access controls. Later, you found out that the Ransom gang failed to breach the higher education institution due to the new implementation
      • Examples
        • CISA Alert about a threat actor
      • Used by
        • The board
        • Executives
        • C-Level
      • Used for
        • Make informed investment decisions
        • Manage risk strategies and investments based on the cyber threat landscape

Threat Intelligence Steps

Planning & Direction

Define the scope and goals of the threat intelligence program (what problems need to be solved and what data has to be obtained to deliver the proper solutions)

Collection

Collect data from multiple sources

  • Open Source Intelligence (OSINT)
    • Intelligence collected from free tools or resources
  • Social Media Intelligence (SOCMINT)
    • Intelligence collected from social media platforms
  • Human Intelligence (HUMINT)
    • Intelligence collected and provided by human sources
  • Geospatial Intelligence (GEOINT)
    • Intelligence collected from images analysis and data associated with a particular location
  • Measurement and signature intelligence (MASINT)
    • Intelligence collected from quantitative and qualitative data about specific target (Requires complex tools and equipment to obtain information)
  • Signals Intelligence (SIGINT)
    • Intelligence collected from electronic signals and systems
  • Technical Intelligence (TECHINT)
  • Imagery Intelligence (IMINT)
    • Intelligence collected through the interpretation or analysis of imagery, infrared, lasers, multi-spectral sensors, or radar
  • Financial Intelligence (FININT)
    • Intelligence collected about suspicious or unusual financial activities

Processing

Convert the gathered raw data into a readable\usable format (Remove false positives and structure the data)

Analysis & Production

Evaluate the structured data and create actionable information based on the requirements specified in the Planning step

Dissemination & Feedback

Share the finished intelligence output with the appropriate stakeholders


Threat Intelligence Feeds 

External streams of data related to potential or current threats, those feeds can be ingested into security tools and platforms to find or block a threat.

ID

fe47147d-35bb-4d54-b2e2-0299050a6ceb

References

threat-intelligence's People

Contributors

giga-a avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.