During an incident response, a team used specific artifacts and indicators from the breach to enhance their threat database. This activity exemplifies the use of ____________ in Threat Intelligence.

  • Cyber Threat Intelligence Sharing (CTI Sharing)
  • Indicators of Compromise (IoC)
  • Situational Awareness
  • Threat Hunting
Incorporating specific artifacts and indicators from a breach into a threat database involves using Indicators of Compromise (IoC) in Threat Intelligence. IoCs are evidence or artifacts that indicate a potential security incident. Understanding how IoCs contribute to threat intelligence is crucial for proactive threat detection and enhancing overall cybersecurity defenses.__________________________________________________
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *