Cargando…

Mastering cyber intelligence : gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense /

Develop the analytical skills to effectively safeguard your organization by enhancing defense mechanisms, and become a proficient threat intelligence analyst to help strategic teams in making informed decisions Key Features Build the analytics skills and practices you need for analyzing, detecting,...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Dahj, Jean Nestor M.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2022.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright
  • Dedication
  • Contributors
  • Table of Contents
  • Preface
  • Section 1: Cyber Threat Intelligence Life Cycle, Requirements, and Tradecraft
  • Chapter 1: Cyber Threat Intelligence Life Cycle
  • Technical requirements
  • Cyber threat intelligence
  • a global overview
  • Characteristics of a threat
  • Threat intelligence and data security challenges
  • Importance and benefits of threat intelligence
  • Planning, objectives, and direction
  • Intelligence data collection
  • Intelligence data processing
  • Analysis and production
  • Threat intelligence dissemination
  • Threat intelligence feedback
  • Summary
  • Chapter 2: Requirements and Intelligence Team Implementation
  • Technical requirements
  • Threat intelligence requirements and prioritization
  • Prioritizing intelligence requirements
  • Requirements development
  • Operational environment definition
  • Network defense impact description
  • Current cyber threats
  • evaluation
  • Developing a course of action
  • Intelligence preparation for intelligence requirements
  • Intelligence team layout and prerequisites
  • Intelligence team implementation
  • Intelligence team structuring
  • Intelligence team application areas
  • Summary
  • Chapter 3: Cyber Threat Intelligence Frameworks
  • Technical requirements
  • Intelligence frameworks
  • overview
  • Why cyber threat frameworks?
  • Cyber threat framework architecture and operating model
  • Lockheed Martin's Cyber Kill Chain framework
  • Use case
  • Lockheed Martin's Cyber Kill Chain model mapping
  • Integrating the Cyber Kill Chain model into an intelligence project
  • Benefits of the Cyber Kill Chain framework
  • MITRE's ATT & CK knowledge-based framework
  • How it works
  • Use case
  • ATT & CK model mapping
  • Integrating the MITRE ATT & CK framework
  • Benefits of the ATT & CK framework
  • Diamond model of intrusion analysis framework
  • How it works
  • Use case
  • Diamond model of intrusion analysis
  • Integrating the Diamond model into intelligence projects
  • Benefits of the Diamond model
  • Summary
  • Chapter 4: Cyber Threat Intelligence Tradecraft and Standards
  • Technical requirements
  • The baseline of intelligence analytic tradecraft
  • Note 1
  • Addressing CTI consumers' interests
  • Note 2
  • Access and credibility
  • Note 3
  • Articulation of assumptions
  • Note 4
  • Outlook
  • Note 5
  • Facts and sourcing
  • Note 6
  • Analytic expertise
  • Note 7
  • Effective summary
  • Note 8
  • Implementation analysis
  • Note 9
  • Conclusions
  • Note 10
  • Tradecraft and counterintelligence
  • Understanding and adapting ICD 203 to CTI
  • Understanding the STIX standard
  • Using STIX for cyber threat analysis
  • Specifying threat indicator patterns using STIX
  • Using the STIX standard for threat response management
  • Threat intelligence information sharing
  • Understanding the STIX v2 standard
  • Understanding the TAXII standard
  • How TAXII standard works