From the course: Ethical Hacking: Introduction to Ethical Hacking

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Following the threat intelligence lifecycle

Following the threat intelligence lifecycle

- [Instructor] One method to defend against threats is to gather threat activity and turn it into threat intelligence that can help proactively protect against future events. In this segment, we'll discuss the threat intelligence lifecycle. Cyber threat intelligence involves collecting, analyzing, and disseminating information about potential or existing cyber threats, including their capabilities, intentions, and motivations. This intelligence then helps defend the network using actionable intel to proactively block malicious attacks on a network. First, let's talk about the difference between cyber threat information and cyber threat intelligence. Cyber threat information is simply information, it's taken from a number of different sources. It might not be accurate, and in most cases it's not actionable. In contrast, cyber threat intelligence is evaluated by professionals and assessed for relevancy and accuracy.…

Contents