In: Computer Science
It is very common that organizations use threat intelligence to
_________________________________________.
A. |
better know how threat actors carry out their attacks and to
gain insights about the current threat landscape |
|
B. |
hire new employees for their cybersecurity teams |
|
C. |
maintain competitive advantage |
|
D. |
configure their antivirus to be less invasive |
Option A is correct since threat intelligence tools like SIEM, Virustotal and RecordFuture are used for analysing the in coming and outgoing netwok traffic in the organization which help the cyber security teams to gain knowledge of various vulnerabilitu=ies and threat to the orgaization network security. These toolsa are an outstanding resource that analysts may turn to for fast reference regarding several types of compromise indicators across various types of teams.
B.) Hiring new employee may need the candidates to have knowledge and understanding about analysing and handling the intelligence tools and having threat intelligence and analysing skills but not pay any role in requirements.
C.) To maintain competitive advantage over other competitors, organization can work upon improving their business process and requirements but Cyber intelligence tools only provide a secure network infrastructure to the business process.
D.) This option is also correct since information gained from analysis results from the Cyber and threat intelligence tools can be used to robustly configure the network devices by the network administrator and the main purpose of threat intelligence is to get insights into what measures to be taken for protection against threat whether in terms of configuring network devices or computers or policy making etc.