Chapter 14: Threat Intelligence Reporting and Dissemination
The secret to effective and successful Cyber Threat Intelligence (CTI) is its sharing, collaboration within the security world, and, most importantly, sound prioritized intelligence requirements (PIRs) during the initial phase. PIRs were discussed in Chapter 2, Requirements and Intelligence Team Implementation.
Collective knowledge provides better insight and a greater chance of fighting cybercrime and making informed security decisions. For example, shared intelligence reports and pulses (AlienVault Open Threat Exchange) contain adversary groups, campaigns, malware, Tactics, Techniques, and Procedures (TTPs), and relevant Indicators of Compromise (IOCs) that can be used to enhance system security and track adversaries. A threat intelligence analyst performs threat analysis, connects different IOCs and TTPs, and deduces parameters such as the adversary name, the campaign name, the malware used, and the target profile....