Question: A security analyst has been reading about a newly discovered cyber attack from a known threat actor. Which of the following would BEST support the
A security analyst has been reading about a newly discovered cyber attack from a known threat actor. Which of the following would BEST support the analyst's review of the tactics, techniques, and protocols the threat actor was observed using in previous campaigns?
A Security research publications
B The MITRE ATT&CK framework
C The Diamond Model of Intrusion Analysis
D The Cyber Kill Chain
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
