| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910808897303321 |
|
|
Autore |
Dalziel Henry |
|
|
Titolo |
How to define and build an effective cyber threat intelligence capability / / Henry Dalziel |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Waltham, Massachusetts : , : Syngress, , 2015 |
|
©2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
0-12-802730-4 |
0-12-802752-5 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (43 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures |
United States |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Title Page; Copyright Page; Table of contents; Author Biography; Contributing Editors' Biography; Chapter 1 - Introduction; Chapter 2 - A Problem Well-Defined is Half-Solved; 2.1 Data feeds vs. intelligence ; 2.2 Defining threat intelligence ; Chapter 3 - Defining Business Objectives or "Start with Why"; 3.1 When defining business objectives, language matters ; Chapter 4 - Common Objectives of a Threat Intelligence Program; 4.1 - Once you have your why...; Chapter 5 - Translating Objectives into Needs, or "Why Drives What" |
5.1 Illustration: translating the objective into concrete intelligence needs Chapter 6 - How Technology Models Operationalize Threat Data; 6.1 - How- labor options or "how much do I do myself?" ; 6.2 - Implementation - the best laid plans ; Chapter 7 - Who: Given Why, What, and How, Now You Can Ask Where To Get It; 7.1 - Reporting and management communication ; 7.2 - Defining and articulating budget needs ; Chapter 8 - Conclusion and Recap |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
<i><b>Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security</b></i> is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly |
|
|
|
|
|
|
|
|
|
|
difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo |
|
|
|
|
|
| |