Making Incident Response a Security Program Enabler
Tags
maec-delivery-vectors: | Watering Hole |
attack-pattern: | Data Model Models Malware - T1587.001 Malware - T1588.001 Phishing - T1660 Phishing - T1566 Software - T1592.002 Trap - T1546.005 Vulnerabilities - T1588.006 Trap - T1154 |
Common Information
Type | Value |
---|---|
UUID | e80f30f9-aa12-450d-ac22-ac5a8492775e |
Fingerprint | 59d6d4de5a37579b |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | April 26, 2015, midnight |
Added to db | Jan. 18, 2023, 7:55 p.m. |
Last updated | Nov. 14, 2024, 7:59 p.m. |
Headline | Journey Into Incident Response |
Title | Making Incident Response a Security Program Enabler |
Detected Hints/Tags/Attributes | 53/2/6 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 62 | nvlpubs.nist.gov |
|
Details | Domain | 1 | www.nostarch.com |
|
Details | File | 6 | 800-61r2.pdf |
|
Details | Url | 1 | http://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf |
|
Details | Url | 1 | http://www.nostarch.com/nsm |
|
Details | Url | 1 | https://speakerdeck.com/davidjbianco/the-pyramid-of-pain-intel-driven-detection-and-response-to-increase-your-adversarys-cost-of-operations |