Этот коммит содержится в:
Cypher 2022-05-25 21:55:14 -04:00 коммит произвёл GitHub
родитель efa3d9b56c
Коммит 0b2bd8464b
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: 4AEE18F83AFDEB23

Просмотреть файл

@ -23,6 +23,9 @@ A collection of essential resources related cyber threat intelligence theory
| [RAND Corporation](https://en.wikipedia.org/wiki/RAND_Corporation) | RANDs Four-Step Scalable Warning and Resilience Model | [RAND_RRA382-1.pdf](https://www.rand.org/content/dam/rand/pubs/research_reports/RRA300/RRA382-1/RAND_RRA382-1.pdf) |
| [UK National Anti Fraud Network](https://www.nafn.gov.uk/) | Basics of Intelligence Management, including classification, evaluation, dissemination, and the intelligence confidence matrix | [Intelligence%20Management%20Training.pdf](https://www.local.gov.uk/sites/default/files/documents/Intelligence%20Management%20Training.pdf) |
| [International Journal of Intelligence and CounterIntelligence](https://www.tandfonline.com/journals/ujic20) | An argument that CTI is a product without a process, which has several underlying causes and consequences for the CTI practice. It is also argues that the field needs to implement traditional intelligence analysis and methodology, rather than add more technology | [Cyber Threat Intelligence: A Product Without a Process?](https://www.tandfonline.com/doi/full/10.1080/08850607.2020.1780062) |
| [mxm0z](https://github.com/mxm0z/)|This is a collection of great and very useful resources concerning intelligence writing such as manuals/guides, standards, books, and articles|[Awesome Intelligence Writing](https://github.com/mxm0z/awesome-intelligence-writing) |
| [threat-intelligence.eu](https://threat-intelligence.eu)|Technical standards related to threat intelligence|[Standards related to Threat Intelligence
](https://threat-intelligence.eu/standards/) |
### `Practical Threat Intelligence`
@ -33,6 +36,7 @@ A collection of essential resources related cyber threat intelligence theory
| [Trevor Giffen](https://twitter.com/TrevorGiffen) | The Initial Access Broker Landscape | [curatedintel.org](https://www.curatedintel.org/2021/10/initial-access-broker-landscape.html) |
| [Trevor Giffen](https://twitter.com/TrevorGiffen) | Assessing the State of Breached Data Search Services | [curatedintel.org](https://www.curatedintel.org/2021/03/assessing-state-of-breached-data-search.html) |
| [William Thomas](https://twitter.com/BushidoToken) | Threat Group Naming Schemes In Cyber Threat Intelligence | [curatedintel.org](https://www.curatedintel.org/2022/05/threat-group-naming-schemes-in-cyber.html) |
| [William Thomas](https://twitter.com/BushidoToken)|CTI lexicon guide to some of the jargon and acronyms liberally used in threat intelligence|[CTI Lexicon](https://github.com/BushidoUK/CTI-Lexicon/blob/main/Lexicon.md) |
| [Sarah Jones](https://twitter.com/sj94356) | A Brief History of Attribution Mistakes - analyse the mistakes made by others so that you do not repeat them | [securityandtechnology.org](https://securityandtechnology.org/wp-content/uploads/2020/07/summit_archive_1548105619.pdf) |
| [Anastasios Pingios](https://twitter.com/xorlgr) | Intelligence Agency and Security Services Internal Structuring | [xorl.wordpress.com](https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Adversary%20Intelligence.md#intelligence-agency-and-security-services-internal-structure) |
| [RAND Corporation](https://en.wikipedia.org/wiki/RAND_Corporation) | This report describes the fundamental characteristics of cybercriminal black markets and how they have grown into their current state in order to give insight into how their existence can harm the information security environment | [RAND_RR610.pdf](https://www.rand.org/content/dam/rand/pubs/research_reports/RR600/RR610/RAND_RR610.pdf) |