Abstract
Threat intelligence, for the importance it plays in cybersecurity operations and in cybersecurity, is complex and difficult to understand. It is also not easy to execute effectively. Effective use of threat intelligence requires an understanding of what intelligence is and is not, defined objectives for its use, a framework to cut through some of the complexity, and a way to gather metrics and assess how the process is implemented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
Operationalizing Threat Intelligence Using Splunk
- 3.
- 4.
Bob Gourley, Security Intelligence at the Strategic, Operational and Tactical Level, March 19, 2018
- 5.
Christopher Pace, The Threat Intelligence Handbook (Cyber Edge Press, 2018)
- 6.
Christopher Pace, The Threat Intelligence Handbook (Cyber Edge Press, 2018)
- 7.
- 8.
- 9.
Christopher Pace, The Threat Intelligence Handbook (Cyber Edge Press, 2018)
- 10.
- 11.
- 12.
- 13.
- 14.
Jon DiMaggio, The Black Vine Cyberespionage Group, August 6, 2015
- 15.
- 16.
- 17.
RSA Incident Response: Emerging Threat Profile Shell_Crew, January 2014
- 18.
- 19.
- 20.
- 21.
- 22.
- 23.
- 24.
- 25.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Eric C. Thompson
About this chapter
Cite this chapter
Thompson, E.C. (2020). Threat Intelligence. In: Designing a HIPAA-Compliant Security Operations Center. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5608-4_3
Download citation
DOI: https://doi.org/10.1007/978-1-4842-5608-4_3
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-5607-7
Online ISBN: 978-1-4842-5608-4
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books