Book Image

Practical Cyber Intelligence

By : Wilson Bautista Jr.
Book Image

Practical Cyber Intelligence

By: Wilson Bautista Jr.

Overview of this book

<p>Cyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber intelligence and why it is required in terms of a defensive framework.</p> <p>Moving forward, the book provides a practical explanation of the F3EAD protocol with the help of examples. Furthermore, we learn how to go about threat models and intelligence products/frameworks and apply them to real-life scenarios. Based on the discussion with the prospective author I would also love to explore the induction of a tool to enhance the marketing feature and functionality of the book.</p> <p>By the end of this book, you will be able to boot up an intelligence program in your organization based on the operation and tactical/strategic spheres of Cyber defense intelligence.</p>
Table of Contents (17 chapters)

F3EAD for You and for Me

"Information and Intelligence' is the 'Fire and Maneuver' of the 21st Century."
-Major General Michael Flynn, March 2011

The intelligence cycle doesn't stop at the Tactical Level. Information needs to go down to the teams, but at the same time, not all of the strategic priorities necessarily need to be known by the teams that are doing the work. The strategic priorities have to be sorted and distributed to the teams so that they can take action. This is where the F3EAD process comes in, as it is another process that is used by specialized teams to achieve their targets.

F3EAD is a version of the targeting methodology employed by the special operations forces (SOF) that are accountable for some of the most highly-publicized missions in support of incidents happening overseas. F3EAD is a system that enables them to foresee...