Practical Cyber Intelligence

Wilson Bautista Jr.

商品描述

Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation. Key Features Intelligence processes and procedures for response mechanisms Master F3EAD to drive processes based on intelligence Threat modeling and intelligent frameworks Case studies and how to go about building intelligent teams Book DescriptionCyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber intelligence and why it is required in terms of a defensive framework. Moving forward, the book provides a practical explanation of the F3EAD protocol with the help of examples. Furthermore, we learn how to go about threat models and intelligence products/frameworks and apply them to real-life scenarios. Based on the discussion with the prospective author I would also love to explore the induction of a tool to enhance the marketing feature and functionality of the book. By the end of this book, you will be able to boot up an intelligence program in your organization based on the operation and tactical/strategic spheres of Cyber defense intelligence. What you will learn Learn about the Observe-Orient-Decide-Act (OODA) loop and it's applicability to security Understand tactical view of Active defense concepts and their application in today's threat landscape Get acquainted with an operational view of the F3EAD process to drive decision making within an organization Create a Framework and Capability Maturity Model that integrates inputs and outputs from key functions in an information security organization Understand the idea of communicating with the Potential for Exploitability based on cyber intelligence Who this book is forThis book targets incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts; experience in, or knowledge of, security operations, incident responses or investigations is desirable so you can make the most of the subjects presented.

商品描述(中文翻譯)

您的一站式解決方案,可在您的組織中實施一個網絡防禦情報計劃。主要特點包括:基於情報的應對機制的情報處理和程序,掌握F3EAD以推動基於情報的流程,威脅建模和智能框架,案例研究以及如何建立智能團隊。書籍描述網絡情報是您的網絡防禦操作團隊、威脅情報和IT操作之間的缺失環節,為您的組織提供全方位的防禦能力。本書首先介紹了網絡情報的需求以及在防禦框架方面的必要性。接下來,本書通過實例提供了F3EAD協議的實際解釋。此外,我們還學習如何應用威脅模型和情報產品/框架到實際情境中。根據與潛在作者的討論,我也希望探討引入一種工具來增強書籍的市場特性和功能。通過閱讀本書,您將能夠根據網絡防禦情報的操作和戰術/戰略領域,在您的組織中啟動一個情報計劃。您將學到什麼:了解觀察-定位-決策-行動(OODA)循環及其在安全領域的應用,了解主動防禦概念的戰術視圖及其在當今威脅環境中的應用,熟悉F3EAD流程的操作視圖,以推動組織內的決策制定,創建一個框架和能力成熟度模型,將信息安全組織的關鍵功能的輸入和輸出整合起來,了解基於網絡情報的潛在利用可能性的溝通思路。本書適合事件經理、惡意軟件分析師、逆向工程師、數字取證專家和情報分析師;具有安全操作、事件響應或調查的經驗或知識將有助於更好地理解所介紹的主題。