Summaries:


URL Classification

  • Dissemination Strategy:
    • Create and share a guide with employees outlining patterns/trends to look for with malicious URLs
    • Inform employees who to contact and to report any malicious links they see and/or have clicked
  • Courses of Action:
    • Implement tools for scanning links prior to opening and create stricter security measures
    • Create safe/planned phishing exercises to ensure employees remain aware
  • Inform Next Iteration:
    • Gather more safe/non-malicious URLs to even out balance
    • Ensure all URLs are similar in terms of structure (URL parameters, HTTPS://, etc.)

Text Mining

  • Dissemination Strategy:
    • Company email campaigns and training workshops
    • Shared forums and community boards
  • Courses of Action:
    • Develop Cybersecurity standards around coding and source code storage
    • Update Firewalls to deny traffic using known attack ports
    • Update signatures on IDS / IPS to include known vulnerabilities
  • Inform Next Iteration:
    • Use the intelligence to feed new analytical threat models
    • Add direct feed from data sources such as Shodan and NVD
    • Identify new data sources and filters with higher relevancy to industry

DDoS Attacks

  • Dissemination Strategy:
  • Courses of Action:
  • Inform Next Iteration:

IP Geolocation

  • Dissemination Strategy:
  • Courses of Action:
  • Inform Next Iteration: