• Home
  • Coursework
    • Cybersecurity Fundamentals
    • Cryptography
    • Enterprise Security Architecture
    • Cybersecurity Law & Policy
    • Cybersecurity Risk Management
    • Management and Cybersecurity
    • Secure Software Design and Development
    • Network Visualization and Vulnerability Detection
    • Cyber Threat Intelligence
    • Incident Response and Computer Network Forensics
  • Reference Link Library
  • Contact
Course Summary
Cyber Intelligence is the knowledge that allows you to prevent or mitigate cyber-attacks by studying the threat data and providing information on adversaries. It helps to identify, prepare, and prevent attacks by providing information on attackers, their motive, and capabilities. (eccouncil.org, n.d.)
Cyber Threat Intelligence is information gathered and analyzed through internal and external sources on threats that have, will, or currently are targeting an organization. Sources are law enforcement, Information Sharing and Analysis Centers (ISAC), paid feeds by commercial providers, and peer teams, who share indicators and signatures they find. (Bellani, D., 2017)
Using cyber intelligence, security professionals can prevent and contain attacks faster, potentially saving the cost of cyber-attacks. Threat intelligence can elevate enterprise security at every level, including network and cloud security. (eccouncil.org, n.d.)
Course Artifact
cyber_threat_intelligence_plan.pdf
File Size: 382 kb
File Type: pdf
Download File

Reflections
The cyber threat intelligence plan and proposal studies the most recent threat actors to a fictional organization regulated by HIPAA (Health Insurance Portability and Accountability Act) and has gathered this report to consider relevant threat actors, capabilities, and attack methods. The information follows recommendations to improve the security posture. Knowing the challenges and the actors targeting this industry and how Cyber Threat Intelligence can help defenders identify, prevent, and protect their infrastructures. 
Using cyber Intelligence, security professionals can prevent and contain attacks faster, potentially saving the cost of cyber-attacks. Intelligence can elevate enterprise security at every level, including network and cloud security. 
The key insights that prompted the selection of this artifact were to present and discuss how information superiority and dominance are crucial to influencing operations associated with establishing and maintaining cyber security. 
Cybersecurity professionals must know the role of cyber intelligence and how it can proactively identify, mitigate, and remediate threats. Furthermore, we are morally obligated to derive actionable insights from the intelligence data collected to thwart future attacks. (Guercio, K., 2021)
Organizations use CTI to understand the threats that have, will, or are currently targeting the organization. It is a proactive extension of the incident response by leveraging the output from existing cybersecurity monitoring tools. The information obtained from CTI is used to prepare for, prevent and identify cybersecurity threats trying to exploit valuable data. CTI can also be described as evidence-based knowledge about adversary motives, intents, capabilities, enabling environments, and operations. CTI can be focused on a single cybersecurity event or a series of events or trends, and it provides advisory and reactional information to the defender. (Wlosinski, 2021)
​
Ethically, cybersecurity is a form of risk management. Because those risks significantly impact other parties, there is a default ethical duty to disclose those risks when known so that those affected can make informed decisions (Vallor & Bartlett, n.d.).



References
Bellani, D. (n.d.). Home. YouTube. Retrieved April 3, 2023, from https://learn-us-east-1-prod-fleet02-xythos.content.blackboardcdn.com/5c2103143e6a3/4762244?X-Blackboard-S3-Bucket=learn-us-east-1-prod-fleet01-xythos&X-Blackboard-Expiration=1680598800000&X-Blackboard-Signature=7OhnNvD3QgVyas6Fsvi%2BRNwqPjaCnd8by0JfD661U1ECCouncil. (n.d.). What is Cyber Threat Intelligence | Become a Threat Intelligence Analyst. EC-Council. Retrieved April 3, 2023, from https://www.eccouncil.org/cyber-threat-intelligence/Guercio, K. (2023, February 10). Top 7 Threat Intelligence Platforms & Tools for 2023 | eSP. eSecurity Planet. Retrieved April 3, 2023, from https://www.esecurityplanet.com/products/threat-intelligence-platforms/Vallor, S., & Bartlett, R. (n.d.). An Introduction to Cybersecurity Ethics TABLE OF CONTENTS Introduction 2-6 What are the important ethical issues in cybersecurit. Santa Clara University. Retrieved April 3, 2023, from https://www.scu.edu/media/ethics-center/technology-ethics/IntroToCybersecurityEthics.pdf
  • Home
  • Coursework
    • Cybersecurity Fundamentals
    • Cryptography
    • Enterprise Security Architecture
    • Cybersecurity Law & Policy
    • Cybersecurity Risk Management
    • Management and Cybersecurity
    • Secure Software Design and Development
    • Network Visualization and Vulnerability Detection
    • Cyber Threat Intelligence
    • Incident Response and Computer Network Forensics
  • Reference Link Library
  • Contact