ForensicsWiki will continue to operate as it has before and will not be shutting down. Thank you for your continued support of ForensicsWiki.

Difference between revisions of "Cyber Threat Intelligence"

From ForensicsWiki
Jump to: navigation, search
(External Links)
Line 2: Line 2:
  
 
== Standards ==
 
== Standards ==
 +
* IODEF
 
* OpenIOC
 
* OpenIOC
 
* Stix/Cybox
 
* Stix/Cybox
 +
 +
=== IODEF ===
  
 
=== OpenIOC ===
 
=== OpenIOC ===
Line 13: Line 16:
 
== External Links ==
 
== External Links ==
 
* [http://blogs.technet.com/b/msrc/archive/2014/06/23/announcing-microsoft-interflow.aspx Driving a Collectively Stronger Security Community with Microsoft Interflow], by Jerry Bryant, June 23, 2014
 
* [http://blogs.technet.com/b/msrc/archive/2014/06/23/announcing-microsoft-interflow.aspx Driving a Collectively Stronger Security Community with Microsoft Interflow], by Jerry Bryant, June 23, 2014
 +
 +
=== IODEF ===
 +
* [http://tools.ietf.org/html/rfc5070 RFC 5070 - The Incident Object Description Exchange Format]
  
 
=== OpenIOC ===
 
=== OpenIOC ===

Revision as of 07:13, 25 June 2014

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Standards

  • IODEF
  • OpenIOC
  • Stix/Cybox

IODEF

OpenIOC

Cons:

  • Very Mandiant product centric standard

Stix/Cybox

External Links

IODEF

OpenIOC

Stix/Cybox

Tools