Chapter 9

Advanced intelligence capabilities

Abstract

This chapter provides a high-level overview of three advanced security techniques: malware analysis, honeypots, and intrusion deception systems. Each technique is given an overview, discussing the pros and cons of implementing the solution and how they can improve the intelligence of the organization.

Keywords

Malware analysis
Honeypots
Honeynets
Honeytokens
intrusion deception
increasing the cost of attacks
sandboxes
Cuckoo
reverse engineering
Information in this chapter
Malware analysis
Honeypots
Intrusion deception systems

Introduction

Moving an organization from “Whack-a-Mole” security to intelligence-led security is a big challenge in and of itself. Taking the next step ...

Get Building an Intelligence-Led Security Program now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.