O'Reilly logo

Building an Intelligence-Led Security Program by Allan Liska

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3

Building a network security intelligence model

Abstract

This chapter discusses how to apply traditional intelligence methods to the realm of cyber security. It starts by identifying a definition of cyber threat intelligence and then walks through a typical targeted attack. The discussion then turns to using the intelligence pyramid and the intelligence lifecycle to detect targeted attacks earlier in the attack chain. The chapter ends with a discussion around the automation of the cyber threat intelligence lifecycle.

Keywords

cyber threat intelligence
advanced persistent threat (APT)
Tactics, Techniques, and Procedures (TTPs)
indicators of compromise (IOCs)
security automation
intelligence
Information in this chapter
Defining ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required