Pagina's

woensdag 8 augustus 2018

Cyber Threat Intelligence: An Overview

It’s a concept often mentioned and discussed in light of recent cyber crimes on online data and information. But what is cyber threat intelligence really all about, and how does it deter these cyber attacks and protect private data online? 

Image source: Pixabay.com

Cyber threat intelligence is the collection of information from open source intelligence, social media, human intelligence, technical expertise and resources, or intelligence from the deep and dark web. It seeks to research and analyze trends and technical developments in the areas of cybercrime, hactivism, and cyber espionage or cyber spying. The goal is to create preventive measures based on those accumulated data and maintain international security. 

Intelligence tactics, techniques, and procedures have existed long before cyberspace. They are ultimately rooted in defense, and in a military context the principles seek to know the intent of the opponent to inform battle strategies, or to prepare for an attack. 

Cyber threat intelligence is hardly an end-to-end process. It also goes by the intelligence cycle, where data collection is undertaken, results are analyzed, and the resulting intelligence is disseminated and evaluated in light of new information and consumer feedback. As technical intelligence, for example, one may look at indicators of specific malware. Meanwhile, operational intelligence is concerned with the details of an incoming attack and assesses the organization’s ability to determine future threats. 

Cyber threat intelligence has proven beneficial to every level of state, local, tribal, and territorial government entities, from senior executives to police chiefs to policy makers. It also offers value to experts such as security officers, terrorism analysts, and accountants. 

Image source: Pixabay.com

Richard Blech is an entrepreneur, investor, and innovator. He is also the CEO of Secure Channels, a company that comes up with solutions designed to be customizable to its clients’ environment without compromising the level of protection it provides while avoiding additional maintenance and support efforts by support teams. Learn more on this page.