From the course: Advanced Cyber Threat Intelligence
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Analysis of competing hypothesis
From the course: Advanced Cyber Threat Intelligence
Analysis of competing hypothesis
- [Alyssa] Hello and welcome to the second lesson from the module Analysis and Production. In this lesson, we will discover together one technique of analysis, which is analysis of competing hypothesis. Analysis of competing hypothesis is also called ACH. And in this video, we'll mostly call it ACH. This lesson is fully dedicated to explain this technique and we'll start with a quick definition. We also will explain how is it used in CTI, and we will enumerate the different steps of ACH. And finally, we'll close this video with a practical study case about Wannacry incident. CIA defines ACH as a tool to aid judgment on important issues requiring careful weighing of alternative explanations or conclusions. It helps an analyst overcome or at least minimize some of the cognitive limitations that make intelligence analysis so difficult to achieve. Analysis of competing hypothesis or ACH requires an analyst to explicitly identify…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.