Conduct your own research and discuss with the group the following:
Field Techniques of Comparison?
Rules for Based Matching?
What is Fuzzy Matching?
Bonus point
How threat actors can evade detection via threat correlation ?
.
Conduct your own research and discuss with the group the followi.docx
1. Conduct your own research and discuss with the group the
following:
Field Techniques of Comparison?
Rules for Based Matching?
What is Fuzzy Matching?
Bonus point
How threat actors can evade detection via threat correlation ?