Vai al contenuto principale della pagina
| Autore: |
Dalziel Henry
|
| Titolo: |
How to define and build an effective cyber threat intelligence capability / / Henry Dalziel
|
| Pubblicazione: | Waltham, Massachusetts : , : Syngress, , 2015 |
| ©2015 | |
| Edizione: | 1st edition |
| Descrizione fisica: | 1 online resource (43 p.) |
| Disciplina: | 005.8 |
| Soggetto topico: | Computer networks - Security measures |
| Soggetto geografico: | United States |
| Persona (resp. second.): | OlsonEric |
| CarnallJames | |
| Note generali: | Description based upon print version of record. |
| Nota di contenuto: | Cover; Title Page; Copyright Page; Table of contents; Author Biography; Contributing Editors' Biography; Chapter 1 - Introduction; Chapter 2 - A Problem Well-Defined is Half-Solved; 2.1 Data feeds vs. intelligence ; 2.2 Defining threat intelligence ; Chapter 3 - Defining Business Objectives or "Start with Why"; 3.1 When defining business objectives, language matters ; Chapter 4 - Common Objectives of a Threat Intelligence Program; 4.1 - Once you have your why...; Chapter 5 - Translating Objectives into Needs, or "Why Drives What" |
| 5.1 Illustration: translating the objective into concrete intelligence needs Chapter 6 - How Technology Models Operationalize Threat Data; 6.1 - How- labor options or "how much do I do myself?" ; 6.2 - Implementation - the best laid plans ; Chapter 7 - Who: Given Why, What, and How, Now You Can Ask Where To Get It; 7.1 - Reporting and management communication ; 7.2 - Defining and articulating budget needs ; Chapter 8 - Conclusion and Recap | |
| Sommario/riassunto: | <i><b>Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security</b></i> is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo |
| Titolo autorizzato: | How to define and build an effective cyber threat intelligence capability ![]() |
| ISBN: | 0-12-802730-4 |
| 0-12-802752-5 | |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9910808897303321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |