Please enable JavaScript.
Coggle requires JavaScript to display documents.
CBROPS 13-15 - Coggle Diagram
CBROPS 13-15
Chapter 15
-
-
Threat Hunting Process
- Starts with a trigger
- Identify the necessary tools and methodologies
- Reveal new TTPs
- Refine your hunting and enrich with data analytics
- Outcome (success or fail)
-
-
-
-
-
-
Chapter 13
-
-
-
Retrospective analysis
- AMP using threat intelligence
-
-
Chapter 14
Diamond Model
- Meta-features
-- Timestamp
-- Phase
-- Result
-- Direction
-- Methodology
-- Resources
-
-
Cyber Kill Chain
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- C2
- Actions