How to Define and Build an Effective Cyber Threat Intelligence Capability: How to Understand, Justify and Implement a New Approach to Security
Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become i...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Saint Louis
Elsevier Science
2014
|
Schlagworte: | |
Zusammenfassung: | Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security. Learn how to create a proactive strategy for digital securityUse data analysis and threat forecasting to predict and prevent attacks before they startUnderstand the fundamentals of today's threatscape and how best to organize your defenses |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (43 pages) |
ISBN: | 9780128027523 9780128027301 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043615716 | ||
003 | DE-604 | ||
005 | 20201210 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780128027523 |9 978-0-12-802752-3 | ||
020 | |a 9780128027301 |c Print |9 978-0-12-802730-1 | ||
035 | |a (ZDB-30-PQE)EBC1888755 | ||
035 | |a (ZDB-89-EBL)EBL1888755 | ||
035 | |a (ZDB-38-EBR)ebr10999731 | ||
035 | |a (OCoLC)898422494 | ||
035 | |a (DE-599)BVBBV043615716 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Dalziel, Henry |e Verfasser |0 (DE-588)1094710652 |4 aut | |
245 | 1 | 0 | |a How to Define and Build an Effective Cyber Threat Intelligence Capability |b How to Understand, Justify and Implement a New Approach to Security |
264 | 1 | |a Saint Louis |b Elsevier Science |c 2014 | |
264 | 4 | |c © 2015 | |
300 | |a 1 online resource (43 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security. Learn how to create a proactive strategy for digital securityUse data analysis and threat forecasting to predict and prevent attacks before they startUnderstand the fundamentals of today's threatscape and how best to organize your defenses | ||
650 | 4 | |a Computer networks -- Security measures | |
700 | 1 | |a Olson, Eric |d 1983- |e Sonstige |0 (DE-588)102462403X |4 oth | |
700 | 1 | |a Carnall, James |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Dalziel, Henry |t How to Define and Build an Effective Cyber Threat Intelligence Capability : How to Understand, Justify and Implement a New Approach to Security |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029029775 |
Datensatz im Suchindex
_version_ | 1804176358195068928 |
---|---|
any_adam_object | |
author | Dalziel, Henry |
author_GND | (DE-588)1094710652 (DE-588)102462403X |
author_facet | Dalziel, Henry |
author_role | aut |
author_sort | Dalziel, Henry |
author_variant | h d hd |
building | Verbundindex |
bvnumber | BV043615716 |
collection | ZDB-30-PQE |
ctrlnum | (ZDB-30-PQE)EBC1888755 (ZDB-89-EBL)EBL1888755 (ZDB-38-EBR)ebr10999731 (OCoLC)898422494 (DE-599)BVBBV043615716 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03269nmm a2200397zc 4500</leader><controlfield tag="001">BV043615716</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20201210 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128027523</subfield><subfield code="9">978-0-12-802752-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128027301</subfield><subfield code="c">Print</subfield><subfield code="9">978-0-12-802730-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1888755</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1888755</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10999731</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)898422494</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043615716</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dalziel, Henry</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1094710652</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to Define and Build an Effective Cyber Threat Intelligence Capability</subfield><subfield code="b">How to Understand, Justify and Implement a New Approach to Security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Saint Louis</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (43 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security. Learn how to create a proactive strategy for digital securityUse data analysis and threat forecasting to predict and prevent attacks before they startUnderstand the fundamentals of today's threatscape and how best to organize your defenses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks -- Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Olson, Eric</subfield><subfield code="d">1983-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)102462403X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Carnall, James</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Dalziel, Henry</subfield><subfield code="t">How to Define and Build an Effective Cyber Threat Intelligence Capability : How to Understand, Justify and Implement a New Approach to Security</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029029775</subfield></datafield></record></collection> |
id | DE-604.BV043615716 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:55Z |
institution | BVB |
isbn | 9780128027523 9780128027301 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029029775 |
oclc_num | 898422494 |
open_access_boolean | |
physical | 1 online resource (43 pages) |
psigel | ZDB-30-PQE |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier Science |
record_format | marc |
spelling | Dalziel, Henry Verfasser (DE-588)1094710652 aut How to Define and Build an Effective Cyber Threat Intelligence Capability How to Understand, Justify and Implement a New Approach to Security Saint Louis Elsevier Science 2014 © 2015 1 online resource (43 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security. Learn how to create a proactive strategy for digital securityUse data analysis and threat forecasting to predict and prevent attacks before they startUnderstand the fundamentals of today's threatscape and how best to organize your defenses Computer networks -- Security measures Olson, Eric 1983- Sonstige (DE-588)102462403X oth Carnall, James Sonstige oth Erscheint auch als Druck-Ausgabe Dalziel, Henry How to Define and Build an Effective Cyber Threat Intelligence Capability : How to Understand, Justify and Implement a New Approach to Security |
spellingShingle | Dalziel, Henry How to Define and Build an Effective Cyber Threat Intelligence Capability How to Understand, Justify and Implement a New Approach to Security Computer networks -- Security measures |
title | How to Define and Build an Effective Cyber Threat Intelligence Capability How to Understand, Justify and Implement a New Approach to Security |
title_auth | How to Define and Build an Effective Cyber Threat Intelligence Capability How to Understand, Justify and Implement a New Approach to Security |
title_exact_search | How to Define and Build an Effective Cyber Threat Intelligence Capability How to Understand, Justify and Implement a New Approach to Security |
title_full | How to Define and Build an Effective Cyber Threat Intelligence Capability How to Understand, Justify and Implement a New Approach to Security |
title_fullStr | How to Define and Build an Effective Cyber Threat Intelligence Capability How to Understand, Justify and Implement a New Approach to Security |
title_full_unstemmed | How to Define and Build an Effective Cyber Threat Intelligence Capability How to Understand, Justify and Implement a New Approach to Security |
title_short | How to Define and Build an Effective Cyber Threat Intelligence Capability |
title_sort | how to define and build an effective cyber threat intelligence capability how to understand justify and implement a new approach to security |
title_sub | How to Understand, Justify and Implement a New Approach to Security |
topic | Computer networks -- Security measures |
topic_facet | Computer networks -- Security measures |
work_keys_str_mv | AT dalzielhenry howtodefineandbuildaneffectivecyberthreatintelligencecapabilityhowtounderstandjustifyandimplementanewapproachtosecurity AT olsoneric howtodefineandbuildaneffectivecyberthreatintelligencecapabilityhowtounderstandjustifyandimplementanewapproachtosecurity AT carnalljames howtodefineandbuildaneffectivecyberthreatintelligencecapabilityhowtounderstandjustifyandimplementanewapproachtosecurity |