Statements (51)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Cybersecurity concept
|
gptkbp:alsoKnownAs |
Cyber Threat Intelligence
|
gptkbp:canBe |
operational
tactical technical strategic |
gptkbp:enables |
risk assessment
incident response security automation vulnerability management threat hunting security orchestration security awareness threat actor attribution threat-informed defense threat landscape analysis |
gptkbp:focusesOn |
analyzing cyber threats
identifying cyber threats mitigating cyber threats |
https://www.w3.org/2000/01/rdf-schema#label |
Threat Intelligence
|
gptkbp:includes |
malware analysis
threat actor profiles attack patterns tactics, techniques, and procedures (TTPs) vulnerability information indicators of compromise (IOCs) |
gptkbp:purpose |
improve cybersecurity posture
proactive defense inform security decisions |
gptkbp:relatedStandard |
gptkb:MITRE_ATT&CK
gptkb:TAXII gptkb:STIX OpenIOC |
gptkbp:relatedTo |
risk management
security operations threat detection threat prevention threat response cyber threat landscape cyber threat sharing |
gptkbp:source |
gptkb:government_agency
commercial intelligence feeds industry sharing groups internal telemetry open source intelligence (OSINT) |
gptkbp:usedBy |
organizations
security analysts incident response teams threat hunters |
gptkbp:bfsParent |
gptkb:Fortinet_FortiWeb
|
gptkbp:bfsLayer |
5
|