Difference between revisions of "Cyber Threat Intelligence"

From ForensicsWiki
Jump to: navigation, search
(External Links)
(External Links)
(One intermediate revision by the same user not shown)
Line 4: Line 4:
 
* OpenIOC
 
* OpenIOC
 
* Stix/Cybox
 
* Stix/Cybox
 +
 +
=== OpenIOC ===
 +
Cons:
 +
* Very Mandiant product centric standard
 +
 +
=== Stix/Cybox ===
  
 
== External Links ==
 
== External Links ==
Line 10: Line 16:
 
=== OpenIOC ===
 
=== OpenIOC ===
 
* [http://www.openioc.org/ The OpenIOC framework]
 
* [http://www.openioc.org/ The OpenIOC framework]
 +
 +
=== Stix/Cybox ===
 +
* [http://cybox.mitre.org/ Cyber Observable eXpression]
 +
* [https://stix.mitre.org/ Structured Threat Information eXpression]
  
 
== Tools ==
 
== Tools ==
 
* [[Mantis]]
 
* [[Mantis]]

Revision as of 02:12, 25 June 2014

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Standards

  • OpenIOC
  • Stix/Cybox

OpenIOC

Cons:

  • Very Mandiant product centric standard

Stix/Cybox

External Links

OpenIOC

Stix/Cybox

Tools