Introduction to Cyber Threat Intelligence
Background
Introduction to Cyber Threat Intelligence
Reading Expectation: Material was selected to provide the working knowledge for each module’s Case and SLP. It is expected that the student research, seek out knowledge, and solutions beyond the provided course material.
Required Videos
TED Talks. (2014, June 30) Chris Domas: The 1s and 0s behind cyber warfare
. Retrieved from https://www.youtube.com/watch?v=cWpRxyqDgpM
Center for Development of Security Excellence (CDSE). (2016, May 4). CDSE CI awareness
. Retrieved from https://www.youtube.com/watch?v=IBH4ddYxKyg&index=4&list=PLdRa5TxvtkA2yCf3n5a15I_Tpz2heyHml
Required Reading
Averbuch A. and Siboni, G. (2013). The classic cyber defense methods have failed – what comes next? Military and Strategy Affairs, 5(1). Retrieved from http://www.inss.org.il/uploadImages/systemFiles/MASA5-1Eng5_Averbuch%20and%20Siboni.pdf
Barnum, S. (2014). Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIX™). The MITRE Corporation, 1.1(1), 1-22. Retrieved from http://www.standardscoordination.org/sites/default/files/docs/STIX_Whitepaper_v1.1.pdf
Jarvis, L., Macdonald, S., & Nouri, L. (2014). The cyberterrorism threat: Findings from a survey of researchers. Studies in Conflict & Terrorism, 37(1), 68-90. Retrieved from EBSCO Military & Government Collection. Available from Trident Online Library.
Jasiul, B., Szpyrka, M., & Liwa, J. (2014). Detection and modeling of cyber attacks with petri nets. Entropy, 16(12), 6602-6623. Retrieved from http://www.mdpi.com/1099-4300/16/12/6602
Paletta, D. (2015, Feb 10). White House to create new division to streamline cyber threat intelligence; effort to buttress government, corporate defenses against sophisticated hackers. Wall Street Journal. Retrieved from Trident Library ProQuest
Sternstein, A. (2011). Corporate intelligence. Government Executive, 43(13), 16-18. Retrieved from Trident Library EBSCO Military & Government Collection
Timberg Craig Timberg, C. (2015, May 30). The real story of how the Internet became so vulnerable. Net of Insecurity. Retrieved from http://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/
Required Website
Department of Homeland Security (DHS). Critical Infrastructure Sectors. Retrieved from http://www.dhs.gov/critical-infrastructure-sectors
Department of Homeland Security (DHS). National Infrastructure Protection Plan. Retrieved from http://www.dhs.gov/national-infrastructure-protection-plan
Surfwatch. Cyber Risk Intelligence. https://www.surfwatchlabs.com/threat-categories#Actor
Optional Reading
Bakjhi, S. (2013, May 6). 25 Biggest cyber-attacks in history. Retrieved from http://list25.com/25-biggest-cyber-attacks-in-history/1/
DNI Clapper announces leadership of cyber threat intelligence integration center. (2016, January 07). ODNI News Release No. 1-16
With 2015 cybersecurity challenges in the rearview, 2016 presents new opportunities. (2015). Retrieved from https://securityintelligence.com/with-2015-cybersecurity-challenges-in-the-rearview-2016-presents-new-opportunities/
SLP
Introduction to Cyber Threat Intelligence
We are witnessing a real world cyber intelligence problem. We have the ability to view in real-time global cyber attacks. The Norse organization is exploiting Internet technology to supply live, accurate, and unique cyber-attack intelligence. Blocking cyber-attacks exposes cyber breaches and tracks cyber-threats around the globe. There was a time you could simply unplug the computer and the threat was eliminated. Today, computers are wireless. This technology is in our toys, phones, and our automobiles, which introduce cyber vulnerabilities and delivers a global, real world intelligence problem.
For this SLP, answer the following:
Relate cyber threats to a real world intelligence problem.
Describe a noteworthy Cyber Threat Intelligence breach, from 2015 and 2016, that has influenced the public and private sectors.
SLP Assignment Expectations
Assignments should be 3- to 5-pages, double-spaced, excluding the cover and reference pages. Paper format: (a) Cover page, (b) Header, and (c) Body. Submit your assignment by the last day of this module. Provide quotations to support your responses.
Relevance—All content is connected to the question.
Precision—Specific questions are addressed. Statements, facts, and statistics are specific and accurate.
Depth of discussion—Present and integrate points that lead to deeper issues.
Breadth—Multiple perspectives, references, and issues/factors are considered.
Evidence—Points are well-supported with facts, statistics, and references.
Logic—Presented discussion makes sense; conclusions are logically supported by premises, statements, or factual information.
Clarity—Writing is concise, understandable, and contains sufficient detail or examples.
Objectivity—Avoids use of first person and subjective bias.
References—Sources are listed at the end of the paper.
Use strong credible sources: peer-reviewed references, government documents, and subject matter expert materials to support your answer. Your paper will not exceed 5 pages (excluding cover sheet and reference page(s)).