Cyber Intelligence-Driven Risk. Richard O. Moore, III

Cyber Intelligence-Driven Risk - Richard O. Moore, III


Скачать книгу
tion id="u6750976f-4369-58cb-9e4d-3b630dd6573d">

      

      Table of Contents

      1  Cover

      2  Title Page

      3  Copyright

      4  Preface NOTES

      5  Acknowledgments

      6  Introduction NOTES NOTES

      7  CHAPTER 1: Objectives of a Cyber Intelligence-Driven Risk Program NOTES NOTES

      8  CHAPTER 2: Importance of Cyber Intelligence for Businesses NOTES NOTES

      9  CHAPTER 3: Military to Commercial Viability of the CI-DR™ Program NOTES NOTES

      10  CHAPTER 4: CI-DR™ Security Program Components NOTES NOTE

      11  CHAPTER 5: Functional Capabilities of the CI-DRTM Program NOTES NOTES

      12  CHAPTER 6: CI-DR™ Key Capability Next-Generation Security Operations Center NOTES NOTES

      13  CHAPTER 7: CI-DR™ Key Capability Cyber Threat Intelligence NOTES NOTES

      14  CHAPTER 8: CI-DR™ Key Capability Forensic Teams NOTES

      15  CHAPTER 9: CI-DR™ Key Capability Vulnerability Management Teams NOTES NOTES

      16  CHAPTER 10: CI-DR™ Key Capability Incident Response Teams NOTES

      17  CHAPTER 11: CI-DR™ Collection Components NOTES NOTE

      18  CHAPTER 12: CI-DR™ Stakeholders NOTES

      19  Conclusion

      20  Glossary

      21  About the Author and Chapter Authors RICHARD O. MOORE III, MSIA, CISSP, CISM, AUTHOR AND EDITOR STEVEN JOHNSON, DSC, CISM, CISSP, CCE #1463 DEREK OLSON, CISSP, CISM STEVEN M DUFOUR, ISO LEADER AUDITOR, CERTIFIED QUALITY MANAGER

      22  Index

      23  End User License Agreement

      List of Illustrations

      1 IntroductionFIGURE I.1 CI-DR's business value.

      2 Chapter 2FIGURE 2.1 CI-DR™ Cyber intelligence life cycle.

      3 Chapter 4FIGURE 4.1 CI-DR™ maturity.FIGURE 4.2 CI-DR™ functions and capabilities.

      4 Chapter 5FIGURE 5.1 Vulnerability trending metrics.FIGURE 5.2 Risk and control success.FIGURE 5.3 Asset risk assessment.FIGURE 5.4 Assets to architecture.FIGURE 5.5 Assets to coordination.FIGURE 5.6 Application threat trending.FIGURE 5.7 Exception trending.

      5 Chapter 7FIGURE 7.1 Threat reporting.

      6 Chapter 12FIGURE 12.1 CI-DR and AI compatibility.

      Guide

      1  Cover Page

      2  Table of Contents

      3  Begin Reading

      Pages

      1  iii

      2  iv

      3  vii

      4  Скачать книгу