Book Image

Practical Cyber Intelligence

By : Wilson Bautista Jr.
Book Image

Practical Cyber Intelligence

By: Wilson Bautista Jr.

Overview of this book

<p>Cyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber intelligence and why it is required in terms of a defensive framework.</p> <p>Moving forward, the book provides a practical explanation of the F3EAD protocol with the help of examples. Furthermore, we learn how to go about threat models and intelligence products/frameworks and apply them to real-life scenarios. Based on the discussion with the prospective author I would also love to explore the induction of a tool to enhance the marketing feature and functionality of the book.</p> <p>By the end of this book, you will be able to boot up an intelligence program in your organization based on the operation and tactical/strategic spheres of Cyber defense intelligence.</p>
Table of Contents (17 chapters)

Summary

As we've learned in previous chapters, cyber intelligence focuses on the aggregation of information and providing actionable intelligence for personnel to carry out operations. Intelligence collection information is prioritized by the key stakeholders of the organization so that they can have the data necessary in order to make a decision. The raw data comes from the operational level, from teams at the ground level, and flows into the tactical areas of operations for middle management to take decisions on.

Understanding this, we look at strategic priorities for information as a means to enable the right resources to concentrate on the correct items that need to be addressed. The collection efforts and actions can be addressed by automated or manual means, which, if we utilize the tenets of OPSEC and understand OODA, we can create an Active Defense capability for...