During an incident response, a team used specific artifacts and indicators from the breach to enhance their threat database. This activity exemplifies the use of ____________ in Threat Intelligence.
- Cyber Threat Intelligence Sharing (CTI Sharing)
- Indicators of Compromise (IoC)
- Situational Awareness
- Threat Hunting
Incorporating specific artifacts and indicators from a breach into a threat database involves using Indicators of Compromise (IoC) in Threat Intelligence. IoCs are evidence or artifacts that indicate a potential security incident. Understanding how IoCs contribute to threat intelligence is crucial for proactive threat detection and enhancing overall cybersecurity defenses.__________________________________________________
Loading...
Related Quiz
- In the context of firewalls, what does the term "stateful inspection" refer to?
- ____________ is a type of attack that quantum computers could potentially perform to quickly factorize large numbers, undermining certain types of public key cryptography.
- In the context of access control, the decision to grant or deny a user's request is referred to as _______.
- What is the purpose of a 'consensus algorithm' in a blockchain network?
- Which protocol is primarily used to secure web traffic between a browser and a server?