Vai al contenuto principale della pagina

How to define and build an effective cyber threat intelligence capability / / Henry Dalziel



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Dalziel Henry Visualizza persona
Titolo: How to define and build an effective cyber threat intelligence capability / / Henry Dalziel Visualizza cluster
Pubblicazione: Waltham, Massachusetts : , : Syngress, , 2015
©2015
Edizione: 1st edition
Descrizione fisica: 1 online resource (43 p.)
Disciplina: 005.8
Soggetto topico: Computer networks - Security measures
Soggetto geografico: United States
Persona (resp. second.): OlsonEric
CarnallJames
Note generali: Description based upon print version of record.
Nota di contenuto: Cover; Title Page; Copyright Page; Table of contents; Author Biography; Contributing Editors' Biography; Chapter 1 - Introduction; Chapter 2 - A Problem Well-Defined is Half-Solved; 2.1 Data feeds vs. intelligence ; 2.2 Defining threat intelligence ; Chapter 3 - Defining Business Objectives or "Start with Why"; 3.1 When defining business objectives, language matters ; Chapter 4 - Common Objectives of a Threat Intelligence Program; 4.1 - Once you have your why...; Chapter 5 - Translating Objectives into Needs, or "Why Drives What"
5.1 Illustration: translating the objective into concrete intelligence needs Chapter 6 - How Technology Models Operationalize Threat Data; 6.1 - How- labor options or "how much do I do myself?" ; 6.2 - Implementation - the best laid plans ; Chapter 7 - Who: Given Why, What, and How, Now You Can Ask Where To Get It; 7.1 - Reporting and management communication ; 7.2 - Defining and articulating budget needs ; Chapter 8 - Conclusion and Recap
Sommario/riassunto: <i><b>Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security</b></i> is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo
Titolo autorizzato: How to define and build an effective cyber threat intelligence capability  Visualizza cluster
ISBN: 0-12-802730-4
0-12-802752-5
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910808897303321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui