Page 22 - cdm-2014
P. 22
( (.,) / .$)( .) 3 ,- /,$.3 (. &&$" (
Milica Djekic, an Online Marketing Coordinator at Dejan SEO and the Editor-in-Chief at
Australian Science Magazine
Cyber security intelligence or cyber intelligence is the tracking, analyzing and countering of
digital security threats. This type of intelligence is a blend of physical espionage and defense
with modern information technology. Different cyber intelligence efforts assist in combating
viruses, hackers and terrorists that exist on the Internet with the aim to steal sensitive
information. Protecting parties from these threats is a major part of this field, but so is
aggressively fighting these threats.
Introduction
In a world where a week rarely goes by without reports of at least one serious cyber attack
against a major organization, it’s important to ask a few key questions: (1) What’s happening
across the threat landscape? (2) What kinds of attacks are being launched? (3) How many of
those attacks result in incidents requiring investigation?
At the same time, an ever-increasing number of devices and growing volumes of data can make
it difficult to develop and deploy effective cyber security measures. So it’s easy to understand
why a medium- to large-sized company is likely to have some 500 security devices deployed
within its network. Of course, not all threats are created equal and no threat should be
overlooked for its importance to any organization. When thinking about security, it’s also
imperative to take a global view of the threat landscape.
That’s where security intelligence comes in. It allows us to see what’s happening, with a critical
eye toward understanding the threat landscape as it really exists. By taking advantage of
advanced analytics to help tackle the massive amount of information collected across monitored
platforms, it is possible to develop real insight into the kinds of attacks that are taking place.
Setting the intelligence requirement
No organization can dedicate resources to counter every threat. In law enforcement agencies,
threats are prioritized and resources are allocated on a priority basis.
Cyber threats are no different and forward thinking organizations are starting to adopt industry
frameworks for categorizing them. Similarly, it is possible to identify vulnerabilities and the
! " $ !
! # ! "