Этот коммит содержится в:
Cypher 2022-05-25 21:27:12 -04:00 коммит произвёл GitHub
родитель 2e0ec5ff0a
Коммит 05321df358
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: 4AEE18F83AFDEB23

Просмотреть файл

@ -21,6 +21,7 @@ A collection of essential resources related cyber threat intelligence theory
| [John Boyd](https://en.wikipedia.org/wiki/John_Boyd_(military_strategist)) | The OODA loop is the cycle observe–orient–decide–act. The approach explains how agility can overcome raw power in dealing with human opponents. It is especially applicable to cyber security and cyberwarfare. | [OODA_Loop.html](https://en.wikipedia.org/wiki/OODA_loop) |
| [RAND Corporation](https://en.wikipedia.org/wiki/RAND_Corporation) | RANDs Four-Step Scalable Warning and Resilience Model | [RAND_RRA382-1.pdf](https://www.rand.org/content/dam/rand/pubs/research_reports/RRA300/RRA382-1/RAND_RRA382-1.pdf) |
| [UK National Anti Fraud Network](https://www.nafn.gov.uk/) | Basics of Intelligence Management, including classification, evaluation, dissemination, and the intelligence confidence matrix | [Intelligence%20Management%20Training.pdf](https://www.local.gov.uk/sites/default/files/documents/Intelligence%20Management%20Training.pdf) |
| [International Journal of Intelligence and CounterIntelligence](https://www.tandfonline.com/journals/ujic20) | An argument that CTI is a product without a process, which has several underlying causes and consequences for the CTI practice. They argue that the CTI field should not address its challenges by adding more technology. They rather need to be informed by the work on intelligence analysis and methodology, also referred to as analytical tradecraft, originally cultivated in the field of intelligence studies | [Cyber Threat Intelligence: A Product Without a Process?](https://www.tandfonline.com/doi/full/10.1080/08850607.2020.1780062) |
### `Practical Threat Intelligence`
@ -44,4 +45,4 @@ A collection of essential resources related cyber threat intelligence theory
| --- | --- | --- |
| [Recorded Future](https://recordedfuture.com)| Recorded Future periodically updates a handbook detailing their vendor-biased roadmap for building an intelligence-led security program. This is useful for understanding what threat intelligence capabilities may need to be integrated with an enterprise CTI program | [The Intelligence Handbook: Fourth Edition](https://go.recordedfuture.com/hubfs/ebooks/intelligence-handbook-fourth-edition.pdf) |
| [Recorded Future](https://recordedfuture.com)| Recorded Future maintains a handbook detailing their vendor-biased playbooks for responding to typical CTI-type detections within an enterprise CTI program. This is useful for understanding what threat intelligence response cases may look like in an enterprise CTI program | [The Intelligence Playbook: Practical Applications Across the Enterprise](https://go.recordedfuture.com/hubfs/The_Intelligence_Playbook_Practical_Applications_Across_the_Enterprise.pdf) |
| [CREST](https://www.crest-approved.org/)| CREST released their CTI Maturity Model Assessment Tool (MMAT) in 2020, a customizable and modular tool for assessing the maturity of a threat intelligence program for free. This tool has three types: Summary, Intermediate, Detailed. In 2022, the tool vanished from CREST's website, but is archived by Curated Intelligence. | [CREST CTI Maturity Model Assessment Tool (MMAT)](https://github.com/curated-intel/CTI-fundamentals/tree/main/Archive/CREST%20CTI%20Maturity%20Model%20Tool) |
| [CREST](https://www.crest-approved.org/)| CREST released their CTI Maturity Model Assessment Tool (MMAT) in 2020, a customizable and modular tool for assessing the maturity of a threat intelligence program for free. This tool has three types: Summary, Intermediate, Detailed. In 2022, the tool vanished from CREST's website, but is archived by Curated Intelligence | [CREST CTI Maturity Model Assessment Tool (MMAT)](https://github.com/curated-intel/CTI-fundamentals/tree/main/Archive/CREST%20CTI%20Maturity%20Model%20Tool) |