说明:收录全文最新的团体标准 提供单次或批量下载
文库搜索
切换导航
文件分类
频道
文件分类
批量下载
使用 STIX™规范 网络威胁情报信息公益 译文项目 Sean Barnum 2014年2月20日 文档信息 原文名称 Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression(STIX™) 原文作者 Sean Barnum 原文发布日期 2014年2月20日 作者简介 原文发布单位 MITRE 原文出处 https://stixproject.github.io/ 译者 小蜜蜂公益翻译组 校对者 小蜜蜂公益翻译组 免责声明 本文原文来自于互联网的公共方式,由“安全加”社区出于学习交流的目的进行翻译,而无任何商业利益的考虑和利用, “安全加”社区已经尽可能地对作者和来源进行了通告,但不保证能够穷尽,如您主张相关权利,请及时与“安全加” 社区联系。 “安全加”社区不对翻译版本的准确性、可靠性作任何保证,也不为由翻译不准确所导致的直接或间接损失承担责任。在使用翻译版本中所包含的技术信息时,用户同意“安全加”社区对可能出现的翻译不完整、或不准确导致的全部或 部分损失不承担任何责任。用户亦保证不用做商业用途,也不以任何方式修改本译文,基于上述问题产生侵权行为的, 法律责任由用户自负。 小蜜蜂公益翻译组 “安全加”社区目录 摘要······························································································ 1 1 引言 ··························································································· 2 2 背景 ··························································································· 3 3 现用方法 ····················································································· 5 4 发展历史 ····················································································· 6 5 何为 STIX? ················································································ 7 6 用例 ··························································································· 8 6.1 (用例 1)分析网络威胁 ··································································· 8 6.2 (用例 2)明确网络威胁的指标特征 ···················································· 8 6.3 (用例 3)管理网络威胁响应活动 ······················································· 8 6.4 (用例 4)共享网络威胁信息 ····························································· 9 7 指导原则 ··················································································· 10 7.1 清晰表达 ······················································································· 10 7.2 集成,而非复制 ·············································································· 10 7.3 灵活性 ·························································································· 10 7.4 扩展性 ·························································································· 10 7.5 自动化 ·························································································· 10 7.6 可读性 ·························································································· 10 8 架构 ·························································································· 11 9 STIX结构 ·················································································· 12 9.1 可观察物 ······················································································· 12 9.2 指标 ····························································································· 12 9.3 安全事件 ······················································································· 12 9.4 策略、技术与过程(TTP) ······························································· 12 9.5 行动 ····························································································· 13 9.6 威胁源起方 ···················································································· 13 9.7 利用目标 ······················································································· 13 9.8 行动方案(COA) ·········································································· 14 9.9 数据标记 ······················································································· 14 10 实现 ······················································································· 15 11 用法 ························································································ 16 12 结论及未来工作 ········································································ 17 13 致谢 ······················································································· 18 参考···························································································· 19使用 STIX™规范网络威胁情报信息 2014年2月 V1.1公益 译文项目 2017 1 摘要 对组织来说,获得网络威胁情报能力越来越必要,而成功获取该等能力的关键要素是与合作伙伴、友商 及所信任的其他人进行信息共享。网络威胁情报和信息共享可帮助组织聚焦庞杂的网络安全信息,并对数据 的使用进行优先级排序
安全加社区 STIX白皮书 2017
文档预览
中文文档
23 页
50 下载
1000 浏览
0 评论
0 收藏
3.0分
赞助1.5元下载(无需注册)
温馨提示:本文档共23页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
下载文档到电脑,方便使用
赞助1.5元下载
本文档由 思安 于
2023-03-04 11:18:02
上传分享
举报
下载
原文档
(1.8 MB)
分享
友情链接
ISO IEC 20547-4 2020 Information technology — Big data reference architecture — P.pdf
ISO 21068-1 2008 Chemical analysis of silicon-carbide-containing raw materials and refractory products — Part 1 General information and sample preparation.pdf
ISO IEC 24756 2009 Information technology — Framework for specifying a common access profile (CAP) of needs and capabilities of users, systems, and their environments.pdf
ISO 9265-1988Woodworking machines. Multi-spindle boring machines. Nomenclature first edition.pdf
ISO 16120-4 2017 Non-alloy steel wire rod for conversion to wire — Part 4 Specific requirements for wire rod for special applications.pdf
ISO 11929-3 2019 Determination of the characteristic limits (decision threshold, detect.pdf
ISO 14085-3 2015 Aerospace series — Hydraulic filter elements — Test methods — Part 3 Filtration efficiency and retention capacity.pdf
ISO TS 30428 2021 Human resource management — Skills and capabilities metrics clus.pdf
ISO 2588 2014 Leather — Sampling — Number of items for a gross sample.pdf
ISO 22201-1 2017 Lifts (elevators), escalators and moving walks — Programmable electronic systems in safety-related applications — Part 1 Lifts (elevators) (PESSRAL).pdf
GB 15235-2007 汽车及挂车倒车灯配光性能.pdf
GB-T 37981-2019 可信性分析技术 可靠性框图法和布尔代数法.pdf
GB-T 42434-2023 飞机恒压变量液压泵通用规范.pdf
GB-T 21073-2007 环氧涂层七丝预应力钢绞线.pdf
GB-T 17250-1998 声学 市区行驶条件下轿车噪声的测量.pdf
GB-T 20494.2-2006 缩微摄影技术 使用单一内显示系统生成影像的COM记录器的质量控制 第2部分 使用方法.pdf
GB-T 8443-1998 纺织品 耐染浴中金属铬盐色牢度试验方法.pdf
GB-T 19867.4-2008 激光焊接工艺规程.pdf
GB-T 19688.3-2005 信息与文献 书目数据元目录 第三部分 情报检索.pdf
GB-T 23686-2018 电子电气产品环境意识设计.pdf
1
/
3
23
评价文档
赞助1.5元 点击下载(1.8 MB)
回到顶部
×
微信扫码支付
1.5
元 自动下载
官方客服微信:siduwenku
支付 完成后 如未跳转 点击这里 下载
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们
微信(点击查看客服)
,我们将及时删除相关资源。