Difference between revisions of "Cyber Threat Intelligence"

From ForensicsWiki
Jump to: navigation, search
(External Links)
Line 2: Line 2:
  
 
== Standards ==
 
== Standards ==
 +
* IODEF
 
* OpenIOC
 
* OpenIOC
 
* Stix/Cybox
 
* Stix/Cybox
 +
 +
=== IODEF ===
  
 
=== OpenIOC ===
 
=== OpenIOC ===
Line 13: Line 16:
 
== External Links ==
 
== External Links ==
 
* [http://blogs.technet.com/b/msrc/archive/2014/06/23/announcing-microsoft-interflow.aspx Driving a Collectively Stronger Security Community with Microsoft Interflow], by Jerry Bryant, June 23, 2014
 
* [http://blogs.technet.com/b/msrc/archive/2014/06/23/announcing-microsoft-interflow.aspx Driving a Collectively Stronger Security Community with Microsoft Interflow], by Jerry Bryant, June 23, 2014
 +
 +
=== IODEF ===
 +
* [http://tools.ietf.org/html/rfc5070 RFC 5070 - The Incident Object Description Exchange Format]
  
 
=== OpenIOC ===
 
=== OpenIOC ===

Revision as of 02:13, 25 June 2014

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Standards

  • IODEF
  • OpenIOC
  • Stix/Cybox

IODEF

OpenIOC

Cons:

  • Very Mandiant product centric standard

Stix/Cybox

External Links

IODEF

OpenIOC

Stix/Cybox

Tools