Introduction To Cyber Intelligence

theblackestday

Yeni üye
26 Ocak 2019
18
0
Hell



Introduction To Cyber Intelligence

What's cyber?

Cyberspace is the conceptual environment in which communication over computer networks takes place. It is an interconnected technology environment.

Initially, the term enters popular culture from science fiction. But today, many people, including technology strategists, industry leaders, security experts and the military, use it.

We also use it to define the area of the worldwide technology environment

etrpNJ.png


What's intelligence?

The word intelligence means receiving news, analyzing, learning new information. But if the word intelligence goes into cyberspace, valuable resources shared on the internet, any kind of information meets our word intelligence.

*
9oxGG7.png


e55ri5.png


What Is A Cyber Threat?

In the cybersecurity community, the threat is more closely identified with the person or enemy trying to access a system. Or a threat can be identified by the tactics, techniques and procedures (TTP) that are done, stolen, or used.

*
z2TjZa.png


Types Of Cyber Threat

Socially Designed Trojans
Unprocessed software (such as Java, Adobe Reader, Flash))
E-fraud
Network roaming worms
Forward Persistent Threats


What Is Cyber Threat Intelligence?


Cyber threat intelligence is information that an organization uses to understand threats targeting the organization. This information is used to prepare, prevent, and identify cyber threats seeking to exploit valuable resources.

cf4OgM.png



Why Is Cyber Threat Intelligence Necessary?


You can't defend your job if you don't know what threats are coming your way, can you?

In every major data breach, the aggrieved companies have a large number of security tools and staff. Yet the personal information of millions of customers continued to disappear. It is certain that you cannot rely on the traditional cybersecurity approach to ensure that your information is protected.

In fact, almost 75% of cyberattacks go undetected.

Instead of waiting until we know you've been breached,
whether conscious or unconscious, the end is positive or negative, whether to create new conditions or take priority measures to change the course of existing conditions.

YNnt4J.png


e55ri5.png




Source: https://www.turkhackteam.org/sosyal-muhendislik/1900978-siber-istihbarata-giris.html
Translator: theblackestday
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.