Cyber threat intelligence : the no-nonsense guide for CISOs and Security Managers /
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organizations resources. Adopting an...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berkeley, CA :
Apress,
2021.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Intro
- Table of Contents
- About the Author
- Acknowledgments
- Introduction
- Chapter 1: The Cybersecurity Wild West
- Identifying the Wheat from the Chaff
- What Kinds of Vendors Are There?
- Where Do You Even Begin? Always Start with Intelligence Requirements
- What Sectors Is Your Business Operating In?
- What Systems and Services Do You Use and Want to Monitor for Threats?
- What Are the Threats You're Worried About As a Business?
- What Other Security Vendors Do You Use?
- What Is Your Business Planning to Do in the Next X Years?
- Further Considerations for IRs
- What Do You Get for Your Money?
- Key Takeaways
- Chapter 2: Cyber Threat Intelligence
- What Does It Even Mean?
- The Intelligence Cycle
- 1. Planning and Direction
- 2. Collection
- 3. Processing and Exploitation
- 4. Analysis
- 5. Dissemination
- 6. Feedback
- The Diamond Model
- Diamond Model
- Adversary
- Diamond Model
- Victim
- Diamond Model
- Infrastructure
- Diamond Model
- Capabilities/TTPs
- How Do We Apply Intelligence to Existing Security? The Cyber Kill-Chain and MITRE ATT & CK Framework
- Human Behavior Doesn't Change
- The IOC Is Dead. Long Live the IOC
- Security Products Are Evolving
- So Should You
- The Cyber Kill-Chain
- Key Takeaways
- Chapter 3: Structured Intelligence
- What Does It Even Mean?
- OpenIOC
- MITRE ATT & CK
- Using MITRE ATT & CK
- STIX
- Why It's Important
- Aligning STIX with ATT & CK
- Where the Magic Happens
- Threat Actor
- Campaign
- Attack Pattern
- Malware
- Vulnerability
- Course of Action
- Victim
- Report
- Indicators
- The Remaining STIX 2.1 Objects
- Grouping
- Identity
- Infrastructure
- Location
- Malware Analysis
- Note
- Observed Data
- Opinion
- Tool
- Relationship
- Sighting
- What About the Kill-Chain?
- Key Takeaways
- Chapter 4: Determining What Your Business Needs
- Who Are Your Customers?
- Intelligence Reporting
- Tactical Intelligence
- Operational Intelligence
- Strategic Intelligence
- Other Types of Intelligence Reporting
- Awareness Reporting
- Executive/VIP Profile Reporting
- Spot/Flash Reporting
- Summary Reporting
- Intelligence Report Structure
- Key Points
- Summary
- Details
- Recommendations
- Appendices
- I Have Requirements! I Have Report Templates! Now What?
- Business Needs
- Automation
- Can This Help?
- What If the Business Doesn't Know What It Wants?
- Key Takeaways
- Chapter 5: How Do I Implement This? (Regardless of Budget)
- Threat Feeds
- News Reports/Blogs
- Social Media
- Data Breach Notifications
- Patch and Vulnerability Notifications
- Geopolitical Affairs
- Industry Events
- Personal Contacts
- Sharing Groups
- Requirements, Check. Basic Collection Sources, Check. Now, What?
- Prioritizing Areas for Funding
- Intelligence Analysts
- How to Use Them
- Different Analysts for Different Things?
- Key Takeaways
- Chapter 6: Things to Consider When Implementing CTI