Book description
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
About This Book
- Intelligence processes and procedures for response mechanisms
- Master F3EAD to drive processes based on intelligence
- Threat modeling and intelligent frameworks
- Case studies and how to go about building intelligent teams
Who This Book Is For
This book targets incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts; experience in, or knowledge of, security operations, incident responses or investigations is desirable so you can make the most of the subjects presented.
What You Will Learn
- Learn about the Observe-Orient-Decide-Act (OODA) loop and it's applicability to security
- Understand tactical view of Active defense concepts and their application in today's threat landscape
- Get acquainted with an operational view of the F3EAD process to drive decision making within an organization
- Create a Framework and Capability Maturity Model that integrates inputs and outputs from key functions in an information security organization
- Understand the idea of communicating with the Potential for Exploitability based on cyber intelligence
In Detail
Cyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber intelligence and why it is required in terms of a defensive framework.
Moving forward, the book provides a practical explanation of the F3EAD protocol with the help of examples. Furthermore, we learn how to go about threat models and intelligence products/frameworks and apply them to real-life scenarios. Based on the discussion with the prospective author I would also love to explore the induction of a tool to enhance the marketing feature and functionality of the book.
By the end of this book, you will be able to boot up an intelligence program in your organization based on the operation and tactical/strategic spheres of Cyber defense intelligence.
Style and approach
A step-by-step practical guide that will help you master defensive frameworks to secure your system, and the F3EAD protocol to help you boot up an intelligence program in your organization.
Publisher resources
Table of contents
- Title Page
- Copyright and Credits
- Dedication
- Packt Upsell
- Contributors
- Preface
-
The Need for Cyber Intelligence
- Need for cyber intelligence
- The application of intelligence in the military
-
Some types of intelligence
- HUMINT or human intelligence
- IMINT or image intelligence
- MASINT or measurement and signature intelligence
- OSINT or open source intelligence
- SIGINT or signals intelligence
- COMINT or communications intelligence
- ELINT or electronic intelligence
- FISINT or foreign instrumentation signals intelligence
- TECHINT or technical intelligence
- MEDINT or medical intelligence
- All source intelligence
- Intelligence drives operations
- Understanding the maneuver warfare mentality
- Summary
- Intelligence Development
- Integrating Cyber Intel, Security, and Operations
- Using Cyber Intelligence to Enable Active Defense
- F3EAD for You and for Me
- Integrating Threat Intelligence and Operations
- Creating the Collaboration Capability
-
The Security Stack
- Purpose of integration – it's just my POV
- Core security service basics
- Security Operations Center
- Capability deep dive – Security Configuration Management
- Prelude – integrating like services
- Integrating cyber intel from different services
- Capability Maturity Model – InfoSec and cyber intel
- Collaboration + Capability = Active Defense
- Summary
-
Driving Cyber Intel
- The gap
- Another set of eyes
- Capability Maturity Model – security awareness
- Summary
-
Baselines and Anomalies
- Setting up camp
- Continuous monitoring – the challenge
- Capability Maturity Model – continuous monitoring overview
- Capability Maturity Model – continuous monitoring level 2
- Summary
- Putting Out the Fires
- Vulnerability Management
- Risky Business
- Assigning Metrics
- Wrapping Up
- Other Books You May Enjoy
Product information
- Title: Practical Cyber Intelligence
- Author(s):
- Release date: March 2018
- Publisher(s): Packt Publishing
- ISBN: 9781788625562
You might also like
book
Mastering Cyber Intelligence
Develop the analytical skills to effectively safeguard your organization by enhancing defense mechanisms, and become a …
audiobook
Cyber Intelligence Driven Risk
Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives and …
book
Cyber Threat Intelligence
CYBER THREAT INTELLIGENCE "Martin takes a thorough and focused approach to the processes that rule threat …
book
Operationalizing Threat Intelligence
Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program Key Features Develop …