Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Threat Intelligence

Posted on by

Threat intelligence is practice of collecting, analyzing, and sharing information about cyber threats and sharing to protect organizations from Cyber Threats

Types of Threat Intelligence

Strategic

Strategic Threat Intelligence provides high level threat trends to organisation. They are non technical which are used by leaders and executives to take strategic decisions with respect to Cyber Security Threat and strategies for protecting the organisation.

Tactical

Tactical Threat Intelligence provides information on tactics, techniques, and procedures (TTPs) used by threat actors when performing attacks. This information can be used to understand the threat actors and their threats.

Technical

Technical threat intelligence focuses on the technical aspect of the threat like Indicator of Comprise (IOC) referring to IP addresses, File Hashes, Domains which can be used by the SOC team to detect and prevent the threats.

Operational

Operational threat intelligence provides information on the motive of the threat adversary.

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme