Strategic cyber intelligence

被引:9
作者
Borum, Randy [1 ]
Felker, John [2 ]
Kern, Sean [3 ]
Dennesen, Kristen [4 ]
Feyes, Tonya [5 ]
机构
[1] Univ S Florida, Sch Informat, Tampa, FL 33620 USA
[2] Hewlett Packard Corp, Cyber Intelligence Strategy, Herndon, VA USA
[3] Natl Def Univ, Washington, DC USA
[4] FireEye Labs, Reston, VA USA
[5] TF Solut, Washington, DC USA
关键词
Risk management; Risk assessment; Competitive intelligence; Cyber intelligence; Cybersecurity; Strategic intelligence;
D O I
10.1108/ICS-09-2014-0064
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose - This paper aims to highlight the importance and role of strategic cyber intelligence to support risk-informed decision-making, ultimately leading to improved objectives, policies, architectures and investments to advance a nation or organization's interests in the cyber domain. Design/methodology/approach - Integration of professional research literature from the fields of intelligence studies, strategy and information/computer security. Findings - Investing in technology, firewalls and intrusion detection systems is appropriate but, by itself, insufficient. Intelligence is a key component. Cyber intelligence emphasizes prevention and anticipation, to focus cybersecurity efforts before an attack occurs ("left of the hack"). Strategic cyber intelligence can substantially reduce risk to the organization's mission and valued assets and support its due diligence. Originality/value - This paper describes how strategic cyber intelligence can be implemented and used within an enterprise to enhance its cyber defense, and create a more proactive and adaptive security posture. It not only describes strategic cyber intelligence as a distinct discipline, but also demonstrates how the key intelligence functions articulate with existing cybersecurity risk management standards.
引用
收藏
页码:317 / 332
页数:16
相关论文
共 25 条
[1]  
Alexander Keith, 2013, COMMUNICATION
[2]  
[Anonymous], 2008, SEC CYB 44 PRES
[3]  
Borum R., 2014, P MAR SAF SEC COUNC, V71, P65
[4]  
Central Intelligence Agency, 2004, C REP INT NEW ER AM, P3
[5]  
Dennesen K., 2014, STRATEGIC CYBER INTE
[6]  
DoD Defense Science Board, 2013, RES MIL SYST ADV CYB
[7]  
Freyn S., 2012, COMPETITIVE INTELLIG, V15, P22
[8]  
Heidenrich J., 2008, STUDIES INTELLIGENCE, V51
[9]  
Heuer, 1999, PSYCHOL INTELLIGENCE
[10]  
International Multilateral Partnership Against Cyber Threats (IMPACT), 2014, WHAT WE STAND FOR