Update README.md
Этот коммит содержится в:
		
							родитель
							
								
									04905d812b
								
							
						
					
					
						Коммит
						eb924bd143
					
				| @ -21,7 +21,7 @@ A collection of essential resources related cyber threat intelligence theory | ||||
| | [John Boyd](https://en.wikipedia.org/wiki/John_Boyd_(military_strategist)) | The OODA loop is the cycle observe–orient–decide–act. The approach explains how agility can overcome raw power in dealing with human opponents. It is especially applicable to cyber security and cyberwarfare. | [OODA_Loop.html](https://en.wikipedia.org/wiki/OODA_loop) | | ||||
| | [RAND Corporation](https://en.wikipedia.org/wiki/RAND_Corporation) | RAND’s Four-Step Scalable Warning and Resilience Model | [RAND_RRA382-1.pdf](https://www.rand.org/content/dam/rand/pubs/research_reports/RRA300/RRA382-1/RAND_RRA382-1.pdf) | | ||||
| | [UK National Anti Fraud Network](https://www.nafn.gov.uk/) | Basics of Intelligence Management, including classification, evaluation, dissemination, and the intelligence confidence matrix | [Intelligence%20Management%20Training.pdf](https://www.local.gov.uk/sites/default/files/documents/Intelligence%20Management%20Training.pdf) | | ||||
| | [International Journal of Intelligence and CounterIntelligence](https://www.tandfonline.com/journals/ujic20) | An argument that CTI is a product without a process, which has several underlying causes and consequences for the CTI practice, and that the field needs to implement traditional intelligence analysis and methodology, referred to as analytical tradecraft, opposed to adding more technology | [Cyber Threat Intelligence: A Product Without a Process?](https://www.tandfonline.com/doi/full/10.1080/08850607.2020.1780062) | | ||||
| | [International Journal of Intelligence and CounterIntelligence](https://www.tandfonline.com/journals/ujic20) | An argument that CTI is a product without a process, which has several underlying causes and consequences for the CTI practice. It is also argued that the field needs to implement traditional intelligence analysis and methodology, rather than add more technology | [Cyber Threat Intelligence: A Product Without a Process?](https://www.tandfonline.com/doi/full/10.1080/08850607.2020.1780062) | | ||||
| 
 | ||||
| ### `Practical Threat Intelligence` | ||||
| 
 | ||||
|  | ||||
		Загрузка…
	
	
			
			x
			
			
		
	
		Ссылка в новой задаче
	
	Block a user
	 Cypher
						Cypher