LEADER 03316nam 2200601 450 001 9910808897303321 005 20200520144314.0 010 $a0-12-802730-4 010 $a0-12-802752-5 035 $a(CKB)2670000000585902 035 $a(EBL)1888755 035 $a(OCoLC)898422494 035 $a(SSID)ssj0001455375 035 $a(PQKBManifestationID)11792520 035 $a(PQKBTitleCode)TC0001455375 035 $a(PQKBWorkID)11391599 035 $a(PQKB)11633273 035 $a(Au-PeEL)EBL1888755 035 $a(CaPaEBR)ebr10999731 035 $a(CaONFJC)MIL679363 035 $a(CaSebORM)9780128027301 035 $a(MiAaPQ)EBC1888755 035 $a(EXLCZ)992670000000585902 100 $a20150110h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHow to define and build an effective cyber threat intelligence capability /$fHenry Dalziel 205 $a1st edition 210 1$aWaltham, Massachusetts :$cSyngress,$d2015. 210 4$dİ2015 215 $a1 online resource (43 p.) 300 $aDescription based upon print version of record. 311 $a1-322-48081-8 327 $aCover; Title Page; Copyright Page; Table of contents; Author Biography; Contributing Editors' Biography; Chapter 1 - Introduction; Chapter 2 - A Problem Well-Defined is Half-Solved; 2.1 Data feeds vs. intelligence ; 2.2 Defining threat intelligence ; Chapter 3 - Defining Business Objectives or "Start with Why"; 3.1 When defining business objectives, language matters ; Chapter 4 - Common Objectives of a Threat Intelligence Program; 4.1 - Once you have your why...; Chapter 5 - Translating Objectives into Needs, or "Why Drives What" 327 $a5.1 Illustration: translating the objective into concrete intelligence needs Chapter 6 - How Technology Models Operationalize Threat Data; 6.1 - How- labor options or "how much do I do myself?" ; 6.2 - Implementation - the best laid plans ; Chapter 7 - Who: Given Why, What, and How, Now You Can Ask Where To Get It; 7.1 - Reporting and management communication ; 7.2 - Defining and articulating budget needs ; Chapter 8 - Conclusion and Recap 330 $a Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo 606 $aComputer networks$xSecurity measures 607 $aUnited States$2fast 615 0$aComputer networks$xSecurity measures. 676 $a005.8 700 $aDalziel$b Henry$01620482 702 $aOlson$b Eric 702 $aCarnall$b James 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910808897303321 996 $aHow to define and build an effective cyber threat intelligence capability$94037138 997 $aUNINA