Systems and Security : Attacks, Threats, and Vulnerabilities
Predictive analysis
1. Threat maps
2. File/code repositories
Threat intelligence sources can also include predictive analysis, threat maps, and file/code repositories. Predictive analysis involves using data, algorithms, and machine learning to identify future threats and potential attack scenarios. Threat maps are visual representations of global security threats and the relationships between different actors and attacks. File/code repositories store and categorize different types of malicious code and software, which can be useful for identifying and tracking specific threats.
Explain Research sources
1. Vendor websites
2. Vulnerability feeds
3. Conferences
4. Academic journals
5. Request for comments (RFC)
6. Local industry groups
7. Social media
8. Threat feeds
9. Adversary tactics, techniques, and procedures (TTP)
Research sources are information resources that can be used to gather information and knowledge about various security threats and trends. They include:
1. Vendor websites, which provide information about product releases, updates, and security features.