Rec. ITU-T X.1217 (01/2021) Guidelines for applying threat intelligence in telecommunication network operation
Summary
History
FOREWORD
Table of Contents
Introduction
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of threat intelligence
7 Overview of applying threat intelligence in telecommunication network operation
     7.1 Data collecting
     7.2 Data processing and analysing
     7.3 Intelligence sharing and applying
8 Guidelines for applying threat intelligence in telecommunication network operation
     8.1 Data collecting
     8.2 Data processing and analysing
          8.2.1 Data cleaning
          8.2.2 Data transforming
          8.2.3 Data analysing
          8.2.4 Situation awareness
     8.3 Intelligence sharing and applying