Page 24 - cdm-2014
P. 24







the quality and relevance of the intelligence products. Best practice indicates that a dynamic
and flexible process of incorporating evolving requirements and responding to immediate needs
is critical.


Acting on intelligence

The best test of the value of the intelligence product is whether it directly informs decisions
about how to tackle cyber security risks. For law enforcement and corporate organizations alike
the key decisions are as follows:

When to act?

Which tactical option to pursue?


Has it been effective?
These questions are very relevant for organizations that are seeking to take offensive action
against the cyber adversary. During an attack, a natural tension occurs between monitoring the
attack to gain further intelligence about the adversary versus neutralizing the threat and
minimizing loss.

Computational Intelligence in Cyber Security

Computational Intelligence techniques have proven to be flexible in decision making in dynamic
environment. They typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent
Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar
computational models. The use of these techniques allowed building efficient and robust
decision support modules, providing cross-linking solutions to different cyber security
applications.

With the proliferation of complex distributed and Internet computing, information security and
privacy become very important. In order to protect large cyber infrastructure, we need flexible,
adaptable and robust cyber defense systems, which can make intelligent decisions in near real-
time in detecting wide variety of threats and attacks. Computational intelligent techniques seem
promising to enhance cyber security measures, and have been increasingly applied in the area
of information security and information assurance.

Conclusion


Cyber intelligence is based on data – and the analytics, tools and people who use them. And
these days, most enterprises are generating more data about what’s going on inside their
businesses than they can put to good use. So, the first thing that can be done is to give some
serious thought on how to use the security data. The majority of organizations is likely to find
that the complexity of their environment is making it difficult to understand and analyze all that
data in a way that will help them make smarter decisions about cyber security.

About The Author

! " $ !
! # ! "
   19   20   21   22   23   24   25   26   27   28   29