Completed
Cyber Threat Landscape
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Behaviors and Patterns of Rogue Hosting Providers
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Cyber Threat Landscape
- 3 Categories of Hosting Providers
- 4 Threat Intelligence Cycle
- 5 Threat Intel Ecosystem Focus Areas
- 6 Requirements
- 7 Our stakeholders
- 8 Collection
- 9 Umbrella Investigate Intel Production Cycle
- 10 Processing
- 11 Autonomous System Number (ASN)
- 12 Analysis
- 13 Leaf (Stub) ASN or leaf ASNs chain
- 14 Indicator: Offshore Business Registration
- 15 Anonymous Payment Methods
- 16 Helping customers to maintain operations
- 17 Sample Rogue Hosters with a Dutch footprint (April 2018)
- 18 Dissemination
- 19 Law enforcement: Cross Jurisdictional Business Model
- 20 Law enforcement: Taking Down Bad Content
- 21 Law Enforcement Recommendations
- 22 Security Community Recommendations
- 23 Policy makers: Recommendations
- 24 Hosting Community Recommendations
- 25 Summary
- 26 References
- 27 Additional Related Work