Abstract
As a subset of cyber security, cyber intelligence, also called: cyber threat intelligence is about information acquisition for tracking, analyzing, and countering of cyber, digital, or information security threats. Cyber intelligence serves as the backbone for integrated security frameworks where the accuracy and credibility of collected information about possible threats can significantly impact the ability to counter or respond to such threats, Fig. 5.1.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Bibliography
ACS (2016) Cybersecurity: threats, challenges, opportunities. https://www.acs.org.au/content/dam/acs/acs-publications/ACS_Cybersecurity_Guide.pdf
Anomali (2017) Medium, shedding some light on the dark web. https://medium.com/@AnomaliDetect/shedding-some-light-on-the-dark-web-9581af0d9600. April 19th 2017
Bottari T (2014) Ten tips on managing RFIs for your construction projects, Oracle Aconex, January, 16, 2014. https://www.aconex.com/blogs/ten-tips-on-managing-rfis-for-your-construction-projects/
Collection plan formats and instructions, FM34-7: globalsecurity. https://www.globalsecurity.org/intell/library/policy/army/fm/34-7/34-7_appd.pdf
Joint Intelligence Support to Military Operations, Homeland Security Digital Library, United States. Joint Chiefs of Staff (1996 and 2004)
Kime B (2016, March 26) Threat intelligence: planning and direction. Unpublished master’s thesis, SANS Technology Institute. https://www.sans.org/reading-room/whitepapers/threats/threat-intelligenceplanning-direction-36857
McCarron V (2015) Big data for defense and intelligence, ttcus.com
VeriSign (2012) Establishing a formal cyber intelligence capability, White Paper. https://www.verisigninc.com/assets/whitepaper-idefense-cyber-intel.pdf. Accessed Nov 17 2014
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Alsmadi, I. (2019). Cyber Intelligence. In: The NICE Cyber Security Framework. Springer, Cham. https://doi.org/10.1007/978-3-030-02360-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-02360-7_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02359-1
Online ISBN: 978-3-030-02360-7
eBook Packages: EngineeringEngineering (R0)