語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber threat intelligencethe no-nons...
~
Roberts, Aaron.
Cyber threat intelligencethe no-nonsense guide for CISOs and Security Managers /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cyber threat intelligenceby Aaron Roberts.
其他題名:
the no-nonsense guide for CISOs and Security Managers /
作者:
Roberts, Aaron.
出版者:
Berkeley, CA :Apress :2021.
面頁冊數:
xxii, 207 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Computer security.
電子資源:
https://doi.org/10.1007/978-1-4842-7220-6
ISBN:
9781484272206
Cyber threat intelligencethe no-nonsense guide for CISOs and Security Managers /
Roberts, Aaron.
Cyber threat intelligence
the no-nonsense guide for CISOs and Security Managers /[electronic resource] :by Aaron Roberts. - Berkeley, CA :Apress :2021. - xxii, 207 p. :ill., digital ;24 cm.
Chapter 1: The Cybersecurity Wild West -- Chapter 2: The Cybersecurity Wild West -- Chapter 3: Cyber Threat Intelligence-What Does It Mean? -- Chapter 4: Determining What Your Business Needs -- Chapter 5: How Can I Implement This? (No Matter Your Budget) -- Chapter 6: Things to Consider When Implementing CTI -- Chapter 7: The Importance of OSINT -- Chapter 8: I Already Pay for Vendor X. Should I Botherwith CTI? -- Chapter 9: Summary -- Chapter 10: Useful Resources.
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization's resources. Adopting an intelligence-led approach enables your organization to nimbly react to situations as they develop. Security controls and responses can then be applied as soon as they become available, enabling prevention rather than response. There are a lot of competing approaches and ways of working, but this book cuts through the confusion. Author Aaron Roberts introduces the best practices and methods for using CTI successfully. This book will help not only senior security professionals, but also those looking to break into the industry. You will learn the theories and mindset needed to be successful in CTI. This book covers the cybersecurity wild west, the merits and limitations of structured intelligence data, and how using structured intelligence data can, and should, be the standard practice for any intelligence team. You will understand your organizations' risks, based on the industry and the adversaries you are most likely to face, the importance of open-source intelligence (OSINT) to any CTI practice, and discover the gaps that exist with your existing commercial solutions and where to plug those gaps, and much more. You will: Know the wide range of cybersecurity products and the risks and pitfalls aligned with blindly working with a vendor Understand critical intelligence concepts such as the intelligence cycle, setting intelligence requirements, the diamond model, and how to apply intelligence to existing security information Understand structured intelligence (STIX) and why it's important, and aligning STIX to ATT&CK and how structured intelligence helps improve final intelligence reporting Know how to approach CTI, depending on your budget Prioritize areas when it comes to funding and the best approaches to incident response, requests for information, or ad hoc reporting Critically evaluate services received from your existing vendors, including what they do well, what they don't do well (or at all), how you can improve on this, the things you should consider moving in-house rather than outsourcing, and the benefits of finding and maintaining relationships with excellent vendors.
ISBN: 9781484272206
Standard No.: 10.1007/978-1-4842-7220-6doiSubjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25 / R63 2021
Dewey Class. No.: 005.8
Cyber threat intelligencethe no-nonsense guide for CISOs and Security Managers /
LDR
:03940nmm a2200337 a 4500
001
608322
003
DE-He213
005
20210809134253.0
006
m d
007
cr nn 008maaau
008
220119s2021 cau s 0 eng d
020
$a
9781484272206
$q
(electronic bk.)
020
$a
9781484272190
$q
(paper)
024
7
$a
10.1007/978-1-4842-7220-6
$2
doi
035
$a
978-1-4842-7220-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
R63 2021
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
R643 2021
100
1
$a
Roberts, Aaron.
$3
905720
245
1 0
$a
Cyber threat intelligence
$h
[electronic resource] :
$b
the no-nonsense guide for CISOs and Security Managers /
$c
by Aaron Roberts.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2021.
300
$a
xxii, 207 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: The Cybersecurity Wild West -- Chapter 2: The Cybersecurity Wild West -- Chapter 3: Cyber Threat Intelligence-What Does It Mean? -- Chapter 4: Determining What Your Business Needs -- Chapter 5: How Can I Implement This? (No Matter Your Budget) -- Chapter 6: Things to Consider When Implementing CTI -- Chapter 7: The Importance of OSINT -- Chapter 8: I Already Pay for Vendor X. Should I Botherwith CTI? -- Chapter 9: Summary -- Chapter 10: Useful Resources.
520
$a
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization's resources. Adopting an intelligence-led approach enables your organization to nimbly react to situations as they develop. Security controls and responses can then be applied as soon as they become available, enabling prevention rather than response. There are a lot of competing approaches and ways of working, but this book cuts through the confusion. Author Aaron Roberts introduces the best practices and methods for using CTI successfully. This book will help not only senior security professionals, but also those looking to break into the industry. You will learn the theories and mindset needed to be successful in CTI. This book covers the cybersecurity wild west, the merits and limitations of structured intelligence data, and how using structured intelligence data can, and should, be the standard practice for any intelligence team. You will understand your organizations' risks, based on the industry and the adversaries you are most likely to face, the importance of open-source intelligence (OSINT) to any CTI practice, and discover the gaps that exist with your existing commercial solutions and where to plug those gaps, and much more. You will: Know the wide range of cybersecurity products and the risks and pitfalls aligned with blindly working with a vendor Understand critical intelligence concepts such as the intelligence cycle, setting intelligence requirements, the diamond model, and how to apply intelligence to existing security information Understand structured intelligence (STIX) and why it's important, and aligning STIX to ATT&CK and how structured intelligence helps improve final intelligence reporting Know how to approach CTI, depending on your budget Prioritize areas when it comes to funding and the best approaches to incident response, requests for information, or ad hoc reporting Critically evaluate services received from your existing vendors, including what they do well, what they don't do well (or at all), how you can improve on this, the things you should consider moving in-house rather than outsourcing, and the benefits of finding and maintaining relationships with excellent vendors.
650
0
$a
Computer security.
$3
184416
650
1 4
$a
Systems and Data Security.
$3
274481
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-7220-6
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000205229
電子館藏
1圖書
電子書
EB QA76.9.A25 R643 2021 2021
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-1-4842-7220-6
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入