华为安全沙龙-安全威胁情报体系的建设与应用 for HW.ppt

华为安全沙龙-安全威胁情报体系的建设与应用 for HW.ppt

  1. 1、本文档共37页,可阅读全部内容。
  2. 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
NG的NG? 情境/情报感知? 以SECaaS模式为核心的网络安全情报中心 安全威胁情报的发展方向 人读 机读 简单 丰富 非实时 实时 孤立 共享 应用结构化的 indicators of compromise(IOC ) 参考STIX定义安全威胁情报元模型,并对关键指标进行标准化 内部、外部可共享的IOCs 情报数据尽量多样化,不应仅是信誉库 应用威胁情报开展情境分析 SOC等分析型优先,逐步推动防护设备支持 自动化共享和分析处置 对于企业应用实践的建议 讨论! NUKE同学的手抄报 也可以关注网站 /author/nuke * 99% of breaches led to compromise within “days” or less with 85% leading to data exfiltration in the same time 85% of breaches took “weeks” or more to discover 84% of data records were stolen as a result of stolen login credential * * OSINT 中情局 公开资源情报计划 Open source intelligence * Cybox 从管理监控属性角度描述事件,如注册表创建,文件删除,访问某个端口 Maec 从攻击,行为模式描述恶意代码的语言 Structured Threat Information eXpression (STIX) effort, which is driven by Mitre. STIX is primarily intended as a concrete strawman for ongoing collaborative development of a structured threat information expression language among a community of relevant experts (source: STIX FAQ v0.3). In other words, its goal is to enable people and organizations to share threat information in order to detect these threats and then build defenses collaboratively (see the Cyber Observable eXpression Web page for details). Trusted Automated eXchange of Indicator Information (TAXII) effort, also by Mitre, that seeks to create a set of protocols and representations that enable the representation and automation-supported sharing of behavioral cyber threat indicators (source: STIX whitepaper). It is a companion effort to STIX. OpenIOC, which is a vendor-developed standard for sharing the data that is useful for discovering threats — known as indicators of compromise (IOCs)4 — that are already present on an organizations network. It is an extensible XML schema for the description of technical characteristics that identify a known threat, an attackers methodology, or other evidence of compromise (see the OpenIOC website for details). Incident Object Description Exchange Format (IODEF), which is an older effort that has been revived and extended to support structured cybersecuri

文档评论(0)

dahunjun + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档