Этот коммит содержится в:
BushidoToken 2022-06-05 23:12:16 +01:00 коммит произвёл GitHub
родитель bf02fe13e7
Коммит e2e50c8c93
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: 4AEE18F83AFDEB23

Просмотреть файл

@ -8,9 +8,10 @@ A collection of essential resources related to cyber threat intelligence theory.
| Author | Description | Resource URL |
| --- | --- | --- |
| [The US Central Intelligence Agency](https://en.wikipedia.org/wiki/Central_Intelligence_Agency)| The traditional Intelligence cycle describes how intelligence is ideally processed in civilian and military intelligence agencies, and law enforcement organizations. | [the-intelligence-cycle.html](https://web.archive.org/web/20200508151219/https://www.cia.gov/kids-page/6-12th-grade/who-we-are-what-we-do/the-intelligence-cycle.html)|
| [Recorded Future](https://recordedfuture.com)| The traditional intelligence life cycle tailored to threat intelligence embedded in modern security operations| [What the 6 Phases of the Threat Intelligence Lifecycle Mean for Your Team](https://web.archive.org/web/20210330021716/https://www.recordedfuture.com/threat-intelligence-lifecycle-phases/) |
| [The US Central Intelligence Agency](https://en.wikipedia.org/wiki/Central_Intelligence_Agency) | This primer highlights structured analytic techniques—some widely used in the private sector and academia, some unique to the intelligence profession | [Tradecraft-Primer-apr09.pdf](https://www.cia.gov/static/955180a45afe3f5013772c313b16face/Tradecraft-Primer-apr09.pdf) |
| [The US Central Intelligence Agency](https://en.wikipedia.org/wiki/Central_Intelligence_Agency) | This primer highlights structured analytic techniques — some widely used in the private sector and academia, some unique to the intelligence profession | [Tradecraft-Primer-apr09.pdf](https://www.cia.gov/static/955180a45afe3f5013772c313b16face/Tradecraft-Primer-apr09.pdf) |
| [The US Central Intelligence Agency](https://en.wikipedia.org/wiki/Central_Intelligence_Agency) | The psychology of intelligence analysis by the CIAs Center for the Study of Intelligence | [Psychology_of_Intelligence_Analysis.pdf](https://www.ialeia.org/docs/Psychology_of_Intelligence_Analysis.pdf) |
| [iSIGHT Partners](https://www.linkedin.com/company/isight-partners) | The first definitive guide to cyber threat intelligence ever produced | [cti-guide.pdf](https://cryptome.org/2015/09/cti-guide.pdf) |
| [Recorded Future](https://recordedfuture.com)| The traditional intelligence life cycle tailored to threat intelligence embedded in modern security operations| [What the 6 Phases of the Threat Intelligence Lifecycle Mean for Your Team](https://web.archive.org/web/20210330021716/https://www.recordedfuture.com/threat-intelligence-lifecycle-phases/) |
| [David J. Bianco](https://twitter.com/DavidJBianco) | Analysing relationships between the types of indicators you might use to detect an adversary's activities and how much pain it will cause them when you are able to deny those indicators to them | [the-pyramid-of-pain.html](https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html) |
| Center for Cyber Intelligence Analysis and Threat Research | The Diamond Model: a novel model of intrusion analysis built by analysts, derived from years of experience | [diamond.pdf](https://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf?adlt=strict) |
| [Lockheed Martin](https://en.wikipedia.org/wiki/Lockheed_Martin) | The Cyber Kill Chain® framework is part of the Intelligence Driven Defense® model for the identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective | [Cyber_Kill_Chain.pdf](https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/Gaining_the_Advantage_Cyber_Kill_Chain.pdf) |