diff --git a/README.md b/README.md index a843579..13647d9 100644 --- a/README.md +++ b/README.md @@ -606,6 +606,15 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r Describes the elements of cyber threat intelligence and discusses how it is collected, analyzed, and used by a variety of human and technology consumers.Fruther examines how intelligence can improve cybersecurity at tactical, operational, and strategic levels, and how it can help you stop attacks sooner, improve your defenses, and talk more productively about cybersecurity issues with executive management in typical for Dummies style. + + + The Diamond Model of Intrusion Analysis + + + This paper presents the Diamond Model, a cognitive framework and analytic instrument to support and improve intrusion analysis. Supporint increased measurability, testability and repeatability + in intrusion analysis in order to attain higher effectivity, efficiency and accuracy in defeating adversaries is one of its main contributions. + + Guide to Cyber Threat Information Sharing by NIST