From the course: Ethical Hacking: Introduction to Ethical Hacking

Unlock the full course today

Join today to access over 23,700 courses taught by industry experts.

Using cyber threat intelligence

Using cyber threat intelligence

- [Narrator] Malicious actors use a variety of ways to launch attacks to gain access to our systems. Cyber threat intelligence helps level the playing field, as it uses previous threat knowledge and reputation to proactively block malicious attacks on a network. In this segment, we'll discover the power of cyber threat intelligence services in maintaining a vigilant posture. Threat intelligence services are powerful as they share information on vulnerabilities, indication of compromise, along with mitigation and detection techniques. Many sources feed into this intelligence, such as the common vulnerabilities and exposures as shown here. The CVE program mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. The CVE is a database of vulnerabilities that uses a standardized naming schema to facilitate the sharing of threat intelligence. So, let's go behind the scenes to see how…

Contents