جزییات کتاب
Your systematic guide to implementing a cyber defense intelligence program in your organizationKey FeaturesUnderstand intelligence processes and procedures for response mechanismsWork through threat modeling and intelligent frameworksExplore real-world case studies and how to go about building intelligent teamsBook DescriptionCyber intelligence is important data that helps your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book begins by explaining the need for cyber intelligence and why it is necessary for a defensive framework.With the help of real-world examples, this book provides a practical explanation of the F3EAD protocol with the help of examples. You will also learn how to implement operations security (OPSEC) and intelligence principles using active defense concepts. In later chapters, you will gain insights into threat models as well as intelligence products and frameworks, and understand how to apply them in real-life scenarios.By the end of this book, you will have learned how to build an intelligence program for your organization based on the operational, tactical or strategic spheres of cyber defense intelligence.What you will learnLearn about the Observe-Orient-Decide-Act (OODA) loop and its applications in securityUnderstand the tactical view of active defense concepts and their application in today's threat landscapeGet acquainted with an operational view of the F3EAD process for better decision making within an organizationCreate a framework and Capability Maturity Model (CMM) that integrates inputs and outputs from key functionsExplore cyber security functions and how threat intel plays a partImplement an intelligence program by incorporating cyber defence strategiesWho This Book Is ForThis book is for incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts. Experience in, or knowledge of, security operations, incident responses and investigations will help you to get the most out of this book.Table of ContentsThe Need for Cyber IntelligenceIntelligence DevelopmentIntegrating Cyber Intel, Security, and OperationsUsing Cyber Intelligence to Enable Active DefenseF3EAD for You and for MeIntegrating Threat Intelligence and OperationsCreating the Collaboration CapabilityThe Security StackDriving Cyber IntelBaselines and AnomaliesPutting Out the FiresVulnerability ManagementRisky BusinessAssigning MetricsWrapping Up