Chapter 10: Threat Modeling and Analysis – Practical Use Cases
The primary goals of cyber threat intelligence (CTI) analytics, at a high level, are finding the source of a threat (an adversary and their activities) and stopping it (although there are several processes and tasks to reach that point, as detailed in the previous chapters). A threat intelligence (TI) analyst must develop strong modeling and analytical skills that must become second nature because time and efficiency are of great importance in modeling and analyzing threats. Hence, the ideal scenario would be to automate the process as much as possible. However, leveraging manual processes is essential to ensure that a CTI analyst knows what to do when it comes to threat analysis.
This chapter focuses on practical threat modeling and analytics examples to illustrate how to conduct intrusion analysis. The chapter's endgame is to equip the intelligence analyst with practical knowledge to analyze threats manually...