Book Image

Practical Cyber Intelligence

By : Wilson Bautista Jr.
Book Image

Practical Cyber Intelligence

By: Wilson Bautista Jr.

Overview of this book

<p>Cyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber intelligence and why it is required in terms of a defensive framework.</p> <p>Moving forward, the book provides a practical explanation of the F3EAD protocol with the help of examples. Furthermore, we learn how to go about threat models and intelligence products/frameworks and apply them to real-life scenarios. Based on the discussion with the prospective author I would also love to explore the induction of a tool to enhance the marketing feature and functionality of the book.</p> <p>By the end of this book, you will be able to boot up an intelligence program in your organization based on the operation and tactical/strategic spheres of Cyber defense intelligence.</p>
Table of Contents (17 chapters)

A quick recap

Vulnerability management is an arm of our security spider that has its own set of processes and procedures:

Vulnerability management provides the capability to find the issues that already exist on our network by scanning against systems and reconciling findings from a vulnerability database. A basic process of understanding this is depicted in the following simple vulnerability management process:

Vulnerability databases are repositories of information about vulnerabilities that have been identified in systems and in software. They are classified by a Common Vulnerabilities and Exposure (CVE) identification that has a number, a brief description, and a public source, which is where it came from. The ratings for each vulnerability are dependent on what tool or database is doing the adjudication. However, the majority of tools start with a Common Vulnerability Scoring...