Further reading
To learn more about the topics that were covered in this chapter, look at the following resources:
- A Threat-Driven Approach to Cyber Security: https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Threat-Driven-Approach.pdf
- Automating threat actor tracking: Understanding attacker behavior for intelligence and contextual alerting: https://www.microsoft.com/security/blog/2021/04/01/automating-threat-actor-tracking-understanding-attacker-behavior-for-intelligence-and-contextual-alerting/
- Cyber Threat Modeling: Survey, Assessment, and Representative Framework: https://www.mitre.org/sites/default/files/publications/pr_18-1174-ngci-cyber-threat-modeling.pdf
- Enriching Attack Models with Cyber Threat Intelligence: https://www.diva-portal.org/smash/get/diva2:1477504/FULLTEXT01.pdf
- ATT&CK 101: https://medium.com/mitre-attack/att-ck-101-17074d3bc62
- Getting Started with ATT&CK: https://www.mitre.org...