Cyber Threat Intelligence

  1. Analysis Techniques and Frameworks
    1. Structured Analytic Techniques
      1. Analysis of Competing Hypotheses
        1. Hypothesis Development
          1. Evidence Evaluation
          2. Key Assumptions Check
            1. Assumption Identification
              1. Assumption Validation
              2. Devil's Advocacy
                1. Challenging Prevailing Views
                  1. Red Team Analysis
                  2. Scenario Analysis
                  3. Threat Modeling
                    1. Threat Identification and Prioritization
                      1. Asset Identification
                        1. Threat Enumeration
                        2. Security Control Identification
                          1. Control Selection
                            1. Effectiveness Assessment
                            2. Threat Modeling Methodologies
                              1. STRIDE
                                1. PASTA
                              2. Analytical Frameworks
                                1. Diamond Model of Intrusion Analysis
                                  1. Adversary
                                    1. Infrastructure
                                      1. Capability
                                        1. Victim
                                          1. Event Correlation
                                          2. Cyber Kill Chain
                                            1. Reconnaissance
                                              1. Weaponization
                                                1. Delivery
                                                  1. Exploitation
                                                    1. Installation
                                                      1. Command and Control
                                                        1. Actions on Objectives
                                                          1. Defensive Strategies
                                                          2. MITRE ATT&CK Framework
                                                            1. Enterprise Matrix
                                                              1. Mobile Matrix
                                                                1. ICS Matrix
                                                                  1. TTPs Mapping
                                                                    1. Adversary Behavior Analysis
                                                                      1. Threat Hunting Applications
                                                                    2. Intelligence Fusion and Correlation
                                                                      1. Cross-Source Correlation
                                                                        1. Temporal and Spatial Analysis