Answered step by step
Verified Expert Solution
Question
1 Approved Answer
A cybersecurity analyst at a tech firm is integrating Open Source Intelligence ( OSINT ) methodologies into the company's vulnerability management program. The analyst seeks
A cybersecurity analyst at a tech firm is integrating Open Source Intelligence OSINT
methodologies into the company's vulnerability management program. The analyst seeks to
use publicly avallable information to understand potential threats better and improve the
firm's security posture. When the cybersecurity analyst integrates OSINT into the
vulnerability management program, which will the analyst MOST likely prioritize to maximize
the effectiveness of the security framework? Select the two best options.
Automating system patch updates based on social media trends
Upgrading the office router every time a new modet is reteased
Analyzing publicly available forums for emerging threat patterns
Monitoring deep web sources for threat indicators
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started