Introduction to Cyber Threat Intelligence
Introduction to Cyber Threat Intelligence
Reading Expectation: Material was selected to provide the working knowledge for each module’s Case and SLP. It is expected that the student research, seek out knowledge, and solutions beyond the provided course material.
Required Videos
TED Talks. (2014, June 30) Chris Domas: The 1s and 0s behind cyber warfare
. Retrieved from https://www.youtube.com/watch?v=cWpRxyqDgpM
Center for Development of Security Excellence (CDSE). (2016, May 4). CDSE CI awareness
. Retrieved from https://www.youtube.com/watch?v=IBH4ddYxKyg&index=4&list=PLdRa5TxvtkA2yCf3n5a15I_Tpz2heyHml
Required Reading
Averbuch A. and Siboni, G. (2013). The classic cyber defense methods have failed – what comes next? Military and Strategy Affairs, 5(1). Retrieved from http://www.inss.org.il/uploadImages/systemFiles/MASA5-1Eng5_Averbuch%20and%20Siboni.pdf
Barnum, S. (2014). Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIX™). The MITRE Corporation, 1.1(1), 1-22. Retrieved from http://www.standardscoordination.org/sites/default/files/docs/STIX_Whitepaper_v1.1.pdf
Jarvis, L., Macdonald, S., & Nouri, L. (2014). The cyberterrorism threat: Findings from a survey of researchers. Studies in Conflict & Terrorism, 37(1), 68-90. Retrieved from EBSCO Military & Government Collection. Available from Trident Online Library.
Jasiul, B., Szpyrka, M., & Liwa, J. (2014). Detection and modeling of cyber attacks with petri nets. Entropy, 16(12), 6602-6623. Retrieved from http://www.mdpi.com/1099-4300/16/12/6602
Paletta, D. (2015, Feb 10). White House to create new division to streamline cyber threat intelligence; effort to buttress government, corporate defenses against sophisticated hackers. Wall Street Journal. Retrieved from Trident Library ProQuest
Sternstein, A. (2011). Corporate intelligence. Government Executive, 43(13), 16-18. Retrieved from Trident Library EBSCO Military & Government Collection
Timberg Craig Timberg, C. (2015, May 30). The real story of how the Internet became so vulnerable. Net of Insecurity. Retrieved from http://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/
Required Website
Department of Homeland Security (DHS). Critical Infrastructure Sectors. Retrieved from http://www.dhs.gov/critical-infrastructure-sectors
Department of Homeland Security (DHS). National Infrastructure Protection Plan. Retrieved from http://www.dhs.gov/national-infrastructure-protection-plan
Surfwatch. Cyber Risk Intelligence. https://www.surfwatchlabs.com/threat-categories#Actor
Optional Reading
Bakjhi, S. (2013, May 6). 25 Biggest cyber-attacks in history. Retrieved from http://list25.com/25-biggest-cyber-attacks-in-history/1/
DNI Clapper announces leadership of cyber threat intelligence integration center. (2016, January 07). ODNI News Release No. 1-16
With 2015 cybersecurity challenges in the rearview, 2016 presents new opportunities. (2015). Retrieved from https://securityintelligence.com/with-2015-cybersecurity-challenges-in-the-rearview-2016-presents-new-opportunities/
Privacy Policy | Contact
Case Assignment
Today, countless computer systems are linked to each other by the Internet, which was not designed to be secure but to be open and accessible. Accessibility comes with threats, risk to data, risk to infrastructure security, and risks to system’s controls. Threat awareness associated with Cyber Threat Intelligence is critical to protecting the critical infrastructure. The benefits from this technology are endless; unfortunately, those with hostile intent can exploit technology in a hostile manner.
For this Case, answer the following:
Define Cyber Threat Intelligence.
Explain the detailed link between the Internet and Cyber Threat Intelligence.
Based on your readings, discuss Cyber Threat Intelligence’s impact on the global and domestic communities.
Assignment Expectations
Assignments should be 3- to 5-pages, double-spaced, excluding the cover and reference pages. Paper format: (a) Cover page, (b) Header, and (c) Body. Submit your assignment by the last day of this module. Provide quotations to support your responses.
Relevance—All content is connected to the question.
Precision—Specific questions are addressed. Statements, facts, and statistics are specific and accurate.
Depth of discussion—Present and integrate points that lead to deeper issues.
Breadth—Multiple perspectives, references, and issues/factors are considered.
Evidence—Points are well-supported with facts, statistics, and references.
Logic—Presented discussion makes sense; conclusions are logically supported by premises, statements, or factual information.
Clarity—Writing is concise, understandable, and contains sufficient detail or examples.
Objectivity—Avoids use of first person and subjective bias.
References—Sources are listed at the end of the paper.
Use strong credible sources: peer-reviewed references, government documents, and subject matter expert materials to support your answer. Your paper will not exceed 5 pages (excluding cover sheet and reference page(s)).