Building an intelligence-led security program /
As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's...
Saved in:
Main Authors: | |
---|---|
Corporate Authors: | |
Group Author: | |
Published: |
Elsevier,
|
Publisher Address: | Amsterdam : |
Publication Dates: |
[2014] ©2015 |
Literature type: | eBook |
Language: | English |
Subjects: | |
Online Access: |
http://www.sciencedirect.com/science/book/9780128021453 |
Summary: |
As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intel |
Carrier Form: | 1 online resource (xv, 175 pages) : illustrations |
Bibliography: | Includes bibliographical references and index. |
ISBN: |
9781322480787 1322480788 9780128023709 0128023708 |
Index Number: | TK5105 |
CLC: | TP393.08 |
Contents: | Understanding the threat -- What is intelligence? -- Building a network security intelligence model -- Gathering data -- Internal intelligence sources -- External intelligence sources -- Fusing internal and external intelligence -- CERTs, ISACs, and intelligencec-sharing communities -- Advanced intelligence capabilities. |