Difference between revisions of "Cyber Threat Intelligence"

From ForensicsWiki
Jump to: navigation, search
Line 1: Line 1:
 
{{expand}}
 
{{expand}}
  
Note that the term cyber is arguable misused [http://en.wikipedia.org/wiki/Internet-related_prefixes] and in this context "Cyber Threat Intelligence" should be considered "Digital Threat Intelligence", "Internet Threat Intelligence" or equivalent.
+
Note that the term cyber is arguable misused in the context of "Cyber Threat Intelligence" [http://en.wikipedia.org/wiki/Internet-related_prefixes] and should be considered more as an equivalent for "Digital Threat Intelligence" or "Internet Threat Intelligence".
  
 
== Standards ==
 
== Standards ==

Revision as of 03:19, 25 June 2014

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Note that the term cyber is arguable misused in the context of "Cyber Threat Intelligence" [1] and should be considered more as an equivalent for "Digital Threat Intelligence" or "Internet Threat Intelligence".

Standards

  • IODEF
  • OpenIOC
  • Stix/Cybox

IODEF

OpenIOC

Cons:

  • Very Mandiant product centric standard

Stix/Cybox

External Links

IODEF

OpenIOC

Stix/Cybox

Tools