How to define and build an effective cyber threat intelligence capability / / Henry Dalziel
| How to define and build an effective cyber threat intelligence capability / / Henry Dalziel |
| Autore | Dalziel Henry |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
| Descrizione fisica | 1 online resource (43 p.) |
| Disciplina | 005.8 |
| Soggetto topico | Computer networks - Security measures |
| ISBN |
0-12-802730-4
0-12-802752-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright Page; Table of contents; Author Biography; Contributing Editors' Biography; Chapter 1 - Introduction; Chapter 2 - A Problem Well-Defined is Half-Solved; 2.1 Data feeds vs. intelligence ; 2.2 Defining threat intelligence ; Chapter 3 - Defining Business Objectives or "Start with Why"; 3.1 When defining business objectives, language matters ; Chapter 4 - Common Objectives of a Threat Intelligence Program; 4.1 - Once you have your why...; Chapter 5 - Translating Objectives into Needs, or "Why Drives What"
5.1 Illustration: translating the objective into concrete intelligence needs Chapter 6 - How Technology Models Operationalize Threat Data; 6.1 - How- labor options or "how much do I do myself?" ; 6.2 - Implementation - the best laid plans ; Chapter 7 - Who: Given Why, What, and How, Now You Can Ask Where To Get It; 7.1 - Reporting and management communication ; 7.2 - Defining and articulating budget needs ; Chapter 8 - Conclusion and Recap |
| Record Nr. | UNINA-9910787901803321 |
Dalziel Henry
|
||
| Waltham, Massachusetts : , : Syngress, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
How to define and build an effective cyber threat intelligence capability / / Henry Dalziel
| How to define and build an effective cyber threat intelligence capability / / Henry Dalziel |
| Autore | Dalziel Henry |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
| Descrizione fisica | 1 online resource (43 p.) |
| Disciplina | 005.8 |
| Soggetto topico | Computer networks - Security measures |
| ISBN |
0-12-802730-4
0-12-802752-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright Page; Table of contents; Author Biography; Contributing Editors' Biography; Chapter 1 - Introduction; Chapter 2 - A Problem Well-Defined is Half-Solved; 2.1 Data feeds vs. intelligence ; 2.2 Defining threat intelligence ; Chapter 3 - Defining Business Objectives or "Start with Why"; 3.1 When defining business objectives, language matters ; Chapter 4 - Common Objectives of a Threat Intelligence Program; 4.1 - Once you have your why...; Chapter 5 - Translating Objectives into Needs, or "Why Drives What"
5.1 Illustration: translating the objective into concrete intelligence needs Chapter 6 - How Technology Models Operationalize Threat Data; 6.1 - How- labor options or "how much do I do myself?" ; 6.2 - Implementation - the best laid plans ; Chapter 7 - Who: Given Why, What, and How, Now You Can Ask Where To Get It; 7.1 - Reporting and management communication ; 7.2 - Defining and articulating budget needs ; Chapter 8 - Conclusion and Recap |
| Record Nr. | UNINA-9910808897303321 |
Dalziel Henry
|
||
| Waltham, Massachusetts : , : Syngress, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||