Chapter I Introduction To Cyber Intelligence
Chapter I Introduction To Cyber Intelligence
Definition
The Need for Cyber Intelligence: The menace of targeted attacks
The monitor- and-respond strategy
Why the strategy is failing
Cyber Threat Intelligence Defined
Key Characteristics: Adversary based
Risk focused
Process oriented
Tailored for diverse consumers
The Benefits of Cyber Threat Intelligence
Definition Cyber intelligence
• Cyber intelligence, also known as cyber threat intelligence (CTI), is the process
of collecting, analyzing, and disseminating data about cyber threats to help
organizations prevent and respond to cyberattacks:
• Purpose
• To help organizations anticipate, prevent, and respond to cyberattacks by
understanding the behavior of threat actors, their tactics, and the
vulnerabilities they exploit
• Data sources
• Includes open source intelligence, social media intelligence, human
intelligence, technical intelligence, device log files, and more
• Benefits
• Helps organizations make informed decisions about how to defend against the
most damaging attacks
• Role in an organization
• A crucial component of an organization's overall security architecture
The Need for Cyber Intelligence
The Need for Cyber Intelligence
• Cyber intelligence is important because it helps organizations prevent or
mitigate cyber attacks, which can be costly.
• Cyber intelligence can help organizations:
• Reduce recovery costs
• By preventing or mitigating attacks, organizations can spend fewer resources
recovering from them
• Improve preparedness
• Cyber intelligence can help organizations improve their cyber incident plans by
providing real-time analysis and insights into attack patterns and techniques.
• Identify threats
• Cyber intelligence can help organizations identify threats they are exposed to,
their motives, and how they operate.
• Prepare for threats
• Cyber intelligence can help organizations prepare for cyber threats by
providing information about them.
The monitor- and-respond strategy
• The monitor-and-respond strategy in cyber intelligence involves continuously monitoring a
computer network or system to identify and respond to cyber threats. This strategy can help
organizations minimize damage and reduce downtime by allowing them to respond to
incidents faster.
• Here are some key aspects of the monitor-and-respond strategy:
• Cyber threat monitoring
• This process involves analyzing data from various sources, such as network devices, web
applications, and user accounts. It also includes checking for known vulnerabilities in
software or hardware.
• Cyber threat intelligence
• This involves collecting, processing, and disseminating data to create actionable
intelligence. Cyber threat intelligence can be categorized as strategic, tactical, or
operational. Each type has its own purpose and uses, but when used together, they can
provide a comprehensive overview of threats.
• Threat detection and response
• This is a critical function that helps organizations find and address cyber threats before they
cause harm.
• Tools
• Tools like intrusion detection systems, firewalls, and antivirus software can be used to detect
and respond to security threats in real-time.
Why the strategy is failing
• A cybersecurity strategy can fail for a number of reasons, including:
• Insufficient investment
• Companies may not invest enough in the latest technology and expertise to stay ahead of
hackers.
• Lack of awareness
• A reduced level of awareness can lead to compromised systems and networks, and the disclosure
of sensitive data.
• Lack of education
• A lack of IT&C security education can contribute to cybersecurity failures.
• Weak security controls
• Weak security controls and practices, such as unpatched software, can allow attackers to gain
access to sensitive information.
• Insider threats
• Individuals within an organization may intentionally or unintentionally compromise security. This
could be through malicious actions or carelessness, such as using weak passwords or falling for
phishing scams.
• A cybersecurity strategy is a plan that involves selecting and implementing best practices to
protect a business from internal and external threats. It helps organizations to better understand
their current environment and profile, and to identify inadequacies and vulnerabilities.
Cyber Threat Intelligence Defined
• Cyber threat intelligence (CTI) is a collection of information that helps
organizations understand and defend against current and future cyber
threats. CTI is a crucial component of security architecture that uses data
from threat history to block and remediate malicious attacks.
• CTI involves the following steps:
• Data collection: Gathering raw data from various sources, such as internal
logs, open-source intelligence (OSINT), and threat feeds
• Data processing: Filtering, correlating, and analyzing the raw data to create
actionable intelligence
• Data dissemination: Sharing the intelligence
• Some examples of threat intelligence include: Attacker identifiers, Common
indicators of compromise (IoCs), Malicious IP addresses, and TTPs
Cyber Threat Intelligence Defined
• Threat intelligence can be divided into three categories:
• Strategic Threat Intelligence
• Strategic threat intelligence provides an overview of the organization’s
threat landscape.
• It is less technical is mainly for executive-level security professionals to drive
high-level organizational strategy based on the findings in the reports.
• Ideally, strategic threat intelligence provides insights like vulnerabilities and
risks associated with the organization’s threat landscape with preventive
actions, threat actors, their goals, and the severity of the potential attacks.
Cyber Threat Intelligence Defined
• Threat intelligence can be divided into three categories:
• Strategic Threat Intelligence
Cyber Threat Intelligence Defined
• Threat intelligence can be divided into three categories:
• Tactical intelligence:
• Tactical threat intelligence consists of more specific details on threat actors
TTP and is mainly for the security team to understand the attack vectors.
• Intelligence gives them insights on how to build a defense strategy to
mitigate those attacks.
• The report includes the vulnerabilities in the security systems that attackers
could take advantage of and how to identify such attacks.