Copyright Goodheart-Willcox Co., Inc. May not be reproduced or posted to a publicly accessible website. 19 Name ________________________________________________________________ Date ________________________ Class ________________ Lab 3-1 Explore Threat Intelligence Sources A proactive method of protecting a network and systems is to monitor and review threat intelligence information and alerts from reliable sources. These sources analyze information that is used by businesses to understand threats that have, will, or may be currently targeting an organization. Learning Goals Identify various threat intelligence resources. Analyze threat intelligence information. Materials Internet access Web browser Procedures Open an Internet browser, and navigate to the website www.CISA.gov. This is the official website of the Cybersecurity and Infrastructure Security Agency, which is part of the US Department of Homeland Security. The main page of the CISA website typically lists infographics and information of strategic or national importance. For example, during the 2020 US Presidential Election, much of the current advisories and bulletins were associated with facts, rumors, and other information about security of the election and voting. 1. What topics are currently trending on the website’s main page? _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 2. Select a blog or article from the main page. Read it and summarize the main points of interest. _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ Security Evaluation CHAPTER 3
Previous Page Next Page