🕵️
CompTIA CySA+
  • Introduction
  • Overview
  • Threat and Vulnerability Management
    • Threat Intelligence
      • Threat Actors
      • Intelligence Sources
      • Indicators of Compromise
      • Confidence Levels
      • Threat Classification
      • Intelligence Cycle
    • Threat Analysis
      • Attack Frameworks
      • Threat Research
      • Threat Modeling
      • Supporting Other Cybersecurity Functions
    • Assessment Tools & Techniques
      • Enumeration
      • Infrastructure Scanners
      • Wireless Scanning
      • Web App Scanners
      • Software Analysis
      • Cloud Security Analysis
    • Vulnerability Management
      • Scanning Criteria
      • Identification
      • Validation
      • Remediation
      • Remediation Inhibitors
    • Special Technology
    • Cloud Security
    • Attacks & Vulnerabilities
  • Software and Systems Security
    • Infrastructure Management
    • Hardware Assurance
    • Software Assurance
  • Security Operations and Monitoring
    • Network Security
    • Security Monitoring
      • Heuristics
      • Trend Analysis
      • Host-based Analysis
      • Network Analysis
      • Log Review
      • Impact Analysis
      • SIEM Review
      • Query Writing
      • Email Analysis
    • Threat Hunting
    • Automation
  • Incident Response
    • Process
    • Procedures
    • Indicators of Compromise
    • Digital Forensics
  • Compliance and Assessment
    • Risk Mitigation
    • Governance
    • Privacy
Powered by GitBook
On this page
  • Open-Source Intelligence
  • Closed-Source Intelligence
  • ISACs

Was this helpful?

  1. Threat and Vulnerability Management
  2. Threat Intelligence

Intelligence Sources

Explain the importance of threat data and intelligence.

As a cybersecurity professional, you must be know where to look for information about what your organization's cyber adversaries are doing. The sources you will find either be open or closed to the public.

Open-Source Intelligence

Open-Source Intelligence, sometimes called OSINT, is publicly-available information about cyber threats.

Closed-Source Intelligence

Closed-Source Intelligence is information about cyber threats that is NOT publicly available.

ISACs

ISACs are Information Sharing and Analysis Communities.

  • Healthcare

  • Financial

  • Aviation

  • Government

  • Critical Infrastructure

PreviousThreat ActorsNextIndicators of Compromise

Last updated 4 years ago

Was this helpful?