Saturday 7 March 2020

Threat Data Vs. Threat Intelligence

Threat Data, Threat Intelligence, EC-Council Study Materials, EC-Council Guides, EC-Council Tutorial and Material

A comprehensive security program focuses on individual goals along with the understanding of processes that makes data useful intelligence. ‘Threat Intelligence’ has become a special buzzword in today’s cybersecurity landscape. However, not many people know what it truly means. The word ‘threat intelligence’ is often misused with ‘threat data’ but they are not the same. In fact, threat data is just a tiny part of the entire threat intelligence process.

What is Threat Data?


Threat data is an amalgamation of malicious domains and IP addresses. It is a vague data that does not provide any reference to cyber threats. It is available in huge quantities with unarguable facts.

What is Threat Intelligence?


Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications, and action-oriented advice about an existing or emerging menace or hazard to assets. This intelligence can be used to make informed decisions regarding the subject’s response to that menace or hazard.” – Gartner

The primary purpose of threat intelligence is two-fold. Firstly, to help organizations understand their threat landscape, and, secondly, to assess the risks that they are potentially exposed to, internal or external.


Threat data becomes threat intelligence when it can produce actionable and relevant information. Threat data, when enriched with threat context, allows organizations to align security strategies with security goals.

Using threat data and threat intelligence

Threat data has no value when it is not used by security teams as reference, prior to making an informed decision. The benefits of threat data are limited. It cannot be used to create tangible threat intelligence in the absence of a defined end goal. Regardless of how much threat data is generated, it will have no value if it is not integrated with the security program.

Threat Data, Threat Intelligence, EC-Council Study Materials, EC-Council Guides, EC-Council Tutorial and Material

Threat data forms a core part of threat intelligence; although, the sources are not created equally. The most common sources of threat data are –

◉ Malware processing
◉ Honeypots
◉ Scanning/crawling
◉ Human intelligence
◉ Internal telemetry

Threat intelligence can be an open-source or a paid subscription. Organizations should maintain threat data to evaluate the results, as per internal intelligence. Selective threat data is passed in real-time, as old or incomplete data can misguide the security team, resulting in data overload and alert fatigue.

When it comes to cloud computing, the incomplete or old data may defocus the team from the security process. IP addresses are released and re-used many times in a day. For a threat intelligence program to be successful, proper analysis of threat data must be done. The goal here is to create operational changes to secure the environment.

The lack of proper planning and execution may reduce the effectiveness of threat intelligence incorporation. If a manufacturing company incorporates threat intelligence from the financial sector, it may not serve the purpose of securing the manufacturing company.

Source: eccouncil.org

Related Posts

0 comments:

Post a Comment