Update README.md
Этот коммит содержится в:
родитель
05321df358
Коммит
04905d812b
@ -21,7 +21,7 @@ A collection of essential resources related cyber threat intelligence theory
|
||||
| [John Boyd](https://en.wikipedia.org/wiki/John_Boyd_(military_strategist)) | The OODA loop is the cycle observe–orient–decide–act. The approach explains how agility can overcome raw power in dealing with human opponents. It is especially applicable to cyber security and cyberwarfare. | [OODA_Loop.html](https://en.wikipedia.org/wiki/OODA_loop) |
|
||||
| [RAND Corporation](https://en.wikipedia.org/wiki/RAND_Corporation) | RAND’s Four-Step Scalable Warning and Resilience Model | [RAND_RRA382-1.pdf](https://www.rand.org/content/dam/rand/pubs/research_reports/RRA300/RRA382-1/RAND_RRA382-1.pdf) |
|
||||
| [UK National Anti Fraud Network](https://www.nafn.gov.uk/) | Basics of Intelligence Management, including classification, evaluation, dissemination, and the intelligence confidence matrix | [Intelligence%20Management%20Training.pdf](https://www.local.gov.uk/sites/default/files/documents/Intelligence%20Management%20Training.pdf) |
|
||||
| [International Journal of Intelligence and CounterIntelligence](https://www.tandfonline.com/journals/ujic20) | An argument that CTI is a product without a process, which has several underlying causes and consequences for the CTI practice. They argue that the CTI field should not address its challenges by adding more technology. They rather need to be informed by the work on intelligence analysis and methodology, also referred to as analytical tradecraft, originally cultivated in the field of intelligence studies | [Cyber Threat Intelligence: A Product Without a Process?](https://www.tandfonline.com/doi/full/10.1080/08850607.2020.1780062) |
|
||||
| [International Journal of Intelligence and CounterIntelligence](https://www.tandfonline.com/journals/ujic20) | An argument that CTI is a product without a process, which has several underlying causes and consequences for the CTI practice, and that the field needs to implement traditional intelligence analysis and methodology, referred to as analytical tradecraft, opposed to adding more technology | [Cyber Threat Intelligence: A Product Without a Process?](https://www.tandfonline.com/doi/full/10.1080/08850607.2020.1780062) |
|
||||
|
||||
### `Practical Threat Intelligence`
|
||||
|
||||
|
||||
Загрузка…
x
Ссылка в новой задаче
Block a user