๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Building an Intelligence-Led Security Program

โœ Scribed by Allan Liska


Publisher
Syngress
Year
2014
Tongue
English
Leaves
176
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective.

Todays effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents.

The problem with current efforts is that many security practitioners dont know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. Youll learn how to understand your network in-depth so that you can protect it in the best possible way.

  • Provides a roadmap and direction on how to build an intelligence-led information security program to protect your company.
  • Learn how to understand your network through logs and client monitoring, so you can effectively evaluate threat intelligence.
  • Learn how to use popular tools such as BIND, SNORT, squid, STIX, TAXII, CyBox, and splunk to conduct network intelligence.

โœฆ Table of Contents


Content:
Front matter, Page iii
Copyright, Page iv
Dedication, Page v
Introduction, Page ix
About the Author, Page xi
About the Technical Editor, Page xiii
Acknowledgments, Page xv
Chapter 1 - Understanding the threat, Pages 1-19
Chapter 2 - What is intelligence?, Pages 21-38
Chapter 3 - Building a network security intelligence model, Pages 39-55
Chapter 4 - Gathering data, Pages 57-75
Chapter 5 - Internal intelligence sources, Pages 77-94
Chapter 6 - External intelligence sources, Pages 95-122
Chapter 7 - Fusing internal and external intelligence, Pages 123-137
Chapter 8 - CERTs, ISACs, and intelligence-sharing communities, Pages 139-151
Chapter 9 - Advanced intelligence capabilities, Pages 153-169
Index, Pages 171-175


๐Ÿ“œ SIMILAR VOLUMES


Building an Effective Security Program
โœ Chris K. Williams; Scott E. Donaldson; Stanley G. Siegel ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› De Gruyter ๐ŸŒ English

<p><em>Building an Effective Security Program</em> provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies,

Building an Effective Security Program
โœ Chris K. Williams; Scott E. Donaldson; Stanley G. Siegel ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› De Gruyter ๐ŸŒ English

<p><em>Building an Effective Security Program</em> provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies,

Building an Information Security Awarene
โœ Mark B. Desman ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐ŸŒ English

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't kno