3 options
How to define and build an effective cyber threat intelligence capability / Henry Dalziel.
- Format:
- Book
- Author/Creator:
- Dalziel, Henry, author.
- Language:
- English
- Subjects (All):
- Computer networks--Security measures.
- Computer networks.
- United States.
- Physical Description:
- 1 online resource (43 p.)
- Edition:
- 1st edition
- Place of Publication:
- Waltham, Massachusetts : Syngress, 2015.
- Language Note:
- English
- System Details:
- text file
- Summary:
- <i><b>Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security</b></i> is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo
- Contents:
- Cover; Title Page; Copyright Page; Table of contents; Author Biography; Contributing Editors' Biography; Chapter 1 - Introduction; Chapter 2 - A Problem Well-Defined is Half-Solved; 2.1 Data feeds vs. intelligence ; 2.2 Defining threat intelligence ; Chapter 3 - Defining Business Objectives or "Start with Why"; 3.1 When defining business objectives, language matters ; Chapter 4 - Common Objectives of a Threat Intelligence Program; 4.1 - Once you have your why...; Chapter 5 - Translating Objectives into Needs, or "Why Drives What"
- 5.1 Illustration: translating the objective into concrete intelligence needs Chapter 6 - How Technology Models Operationalize Threat Data; 6.1 - How- labor options or "how much do I do myself?" ; 6.2 - Implementation - the best laid plans ; Chapter 7 - Who: Given Why, What, and How, Now You Can Ask Where To Get It; 7.1 - Reporting and management communication ; 7.2 - Defining and articulating budget needs ; Chapter 8 - Conclusion and Recap
- Notes:
- Description based upon print version of record.
- Description based on online resource; title from PDF title page (ebrary, viewed January 10, 2015).
- ISBN:
- 0-12-802730-4
- 0-12-802752-5
- OCLC:
- 898422494
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.