Strategic cyber intelligence

被引:9
|
作者
Borum, Randy [1 ]
Felker, John [2 ]
Kern, Sean [3 ]
Dennesen, Kristen [4 ]
Feyes, Tonya [5 ]
机构
[1] Univ S Florida, Sch Informat, Tampa, FL 33620 USA
[2] Hewlett Packard Corp, Cyber Intelligence Strategy, Herndon, VA USA
[3] Natl Def Univ, Washington, DC USA
[4] FireEye Labs, Reston, VA USA
[5] TF Solut, Washington, DC USA
关键词
Risk management; Risk assessment; Competitive intelligence; Cyber intelligence; Cybersecurity; Strategic intelligence;
D O I
10.1108/ICS-09-2014-0064
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose - This paper aims to highlight the importance and role of strategic cyber intelligence to support risk-informed decision-making, ultimately leading to improved objectives, policies, architectures and investments to advance a nation or organization's interests in the cyber domain. Design/methodology/approach - Integration of professional research literature from the fields of intelligence studies, strategy and information/computer security. Findings - Investing in technology, firewalls and intrusion detection systems is appropriate but, by itself, insufficient. Intelligence is a key component. Cyber intelligence emphasizes prevention and anticipation, to focus cybersecurity efforts before an attack occurs ("left of the hack"). Strategic cyber intelligence can substantially reduce risk to the organization's mission and valued assets and support its due diligence. Originality/value - This paper describes how strategic cyber intelligence can be implemented and used within an enterprise to enhance its cyber defense, and create a more proactive and adaptive security posture. It not only describes strategic cyber intelligence as a distinct discipline, but also demonstrates how the key intelligence functions articulate with existing cybersecurity risk management standards.
引用
收藏
页码:317 / 332
页数:16
相关论文
共 50 条
  • [1] Cyber Intelligence: Strategic Warning Is Possible
    Gentry, John A.
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENCE AND COUNTERINTELLIGENCE, 2023, 36 (03) : 729 - 754
  • [2] Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs
    Dog, Spike E.
    Tweed, Alex
    Rouse, Leroy
    Chu, Bill
    Qi, Duan
    Hu, Yueqi
    Yang, Jing
    Al -Shaer, Ehab
    [J]. 2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [3] An Annotated Bibliographical Survey on Cyber Intelligence for Cyber Intelligence Officers
    Yucel, Cagatay
    Koltuksuz, Ahmet
    [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 213 - 220
  • [4] Artificial Intelligence in Cyber Threats Intelligence
    Trifonov, Roumen
    Nakov, Ognyan
    Mladenov, Valeri
    [J]. 2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 49 - 52
  • [5] Strategic intelligence
    Tabacof, Boris
    [J]. O Papel (Brazil), 2002, 63 (06):
  • [6] STRATEGIC INTELLIGENCE
    RANSOM, HH
    [J]. PROCEEDINGS OF THE ACADEMY OF POLITICAL SCIENCE, 1982, 34 (04) : 153 - 164
  • [7] STRATEGIC INTELLIGENCE
    Cade, Dozier C.
    [J]. JOURNALISM QUARTERLY, 1950, 27 (03): : 345 - 345
  • [8] Cyber campaigns and strategic outcomes
    Harknett, Richard J.
    Smeets, Max
    [J]. JOURNAL OF STRATEGIC STUDIES, 2022, 45 (04) : 534 - 567
  • [9] Strategic studies and cyber warfare
    Zilincik, Samuel
    Duyvesteyn, Isabelle
    [J]. JOURNAL OF STRATEGIC STUDIES, 2023, 46 (04) : 836 - 857
  • [10] National Intelligence and Cyber Competitiveness: Partnerships in Cyber Space
    Greiman, Virginia
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 59 - 66