Conducting Investigation to Lay a Firm Foundation for Threat Intelligence

1 Security Event Investigation and Threat Intelligence

Over a year ago, I wrote to put forward three suggestions:

  1. Set up a system for security event disclosure and case analysis.
  2. Clearly delineate security disclosure responsibilities.
  3. Establish a security data and response platform. These measures will gradually promote best security practices at the strategic level, in terms of effectiveness and accuracy and even correctness.

An Analysis of the Ukraine Power Plant Attack Event and Countermeasures Against It

In December 2015, a power outage occurred in Ukraine as a result of a cyberattack, causing a great panic. This document analyzes and verifies the attack event-related information and core samples, and provides a solution accordingly.