Vtome.ru - электронная библиотека

The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics, 2nd edition

  • Добавил: literator
  • Дата: 24-05-2023, 21:12
  • Комментариев: 0
The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics, 2nd editionНазвание: The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics, 2nd edition
Автор: Izzat Alsmadi
Издательство: Springer
Год: 2023
Страниц: 407
Язык: английский
Формат: pdf (true)
Размер: 21.8 MB

This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency-Based Education (CBE) method. The book creates content based on the Knowledge, Skills and Abilities (a.k.a. KSAs) described in the NICE framework.

This book focuses on cyber analytics and intelligence areas. The book has 18 chapters: Introduction, Acquisition Management, Continuity Planning and Disaster Recovery, Cyber Defense Analysis and Support, Cyber Intelligence, Cyber Intelligence Analysis, Cyber Operational Planning, Cyber Policy and Strategy Management, Cyber Threat Analysis, Cybersecurity Management, Forensics Analysis, Identity Management, Incident Response, Collection Operations, Computer Network Defense, Data Analysis, Threat Analysis and last chapter, Vulnerability Assessment.

Software applications and information systems continuously go through cycles of new fixes, updates, enhancements, etc. Every software change may introduce possible vulnerabilities. We assume that such vulnerabilities that exist in acquired software are accidentally or carelessly inserted at any time during the software life cycle. While it is possible that many software systems exist with vulnerabilities that were never exploited or discovered, however, the existence of such vulnerabilities is a serious risk. If such risks are not accounted for (e.g., in risk avoidance, mitigation or tolerance methods), they can cause catastrophic consequences. Examples of categories of such consequences include sensitive data exposures that can jeopardize privacy, intellectual property, integrity, etc. Attacks that expose software vulnerabilities may also cause identity thefts and serious financial losses. Software procurement team should learn how to check with software vendors issues related to software vulnerability. They should know through a series of questions, reading through documentations, interviews with vendors, etc. what vendors have, or have not done as part of their secure development process, how they handle vulnerabilities, etc.

In intelligence collection management, the different activities related to collecting, processing, and reporting or disseminating intelligence collection from various sources are managed. One of the most popular collection management tools (CMTs) in the USA is the Joint Collection Management Tools (JCMT), also known as Collection Management Support Tools (CMST), from DOD Intelligence Information System (DODIIS).

ECHELON (also called or part of SHAMROCK and FROSTING programs) is another relatively old US intelligence collection program that started in the 1960s and integrated in some other programs by the year 2001.

PRISM (also called SIGAD US-984XN), started in 2007, is a code name given to an NSA program related to collecting information from the Internet and online social networks (Washington Post 2013). List of target companies’ databases include Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple.

Скачать The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics, 2nd edition



ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!











ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.