Menu
cyber threat intelligence
Introduction
Intelligence can really be broken down into two different definitions: the government definition and the corporate definition. The government looks at intelligence from the National Security perspective. The DOD definition of intelligence is the “product resulting from the collection, processing, integration, evaluation, analysis, and interpretation of available information concerning foreign nations, hostile or potentially hostile forces or elements, or areas of actual or potential operations.” While that is a mouthful, in simpler terms this is the process of turning gathered information into a product that can be used to protect the country from its adversaries.
Corporate Intelligence, or Competitive Intelligence, is the “process of collecting and analyzing information about competitors’ strengths and weaknesses in a legal and ethical manner to enhance business decision-making.” The key word here is ethical. Corporate Intelligence must be gathered through legal means.
In reality, whether focusing on a government definition or corporate, cyber intelligence is really the means taken to gain an advantage against your adversaries. In the corporate world, the adversaries are competitors that are competing to stay in business and be profitable. Intelligence is used to stay one step ahead of adversaries, and in the case of Cyber Intelligence, it is used to protect systems and data from outside parties that would use it to cause harm to the business.
Cyber threat intelligence will allow an organization to gather intelligence based on analyzing the cyber risk environment, and using that intelligence to alter the cyber threat landscape. Using gathered intelligence can help to anticipate cyber attack before they occur and be able to identify and respond quickly when an attack occurs.
Past breaches like the Sony hack and the WannaCry Malware have shown that major threats come into the cyber landscape in an instant. Using resources to understand where past organizations have failed, and where your own systems are vulnerable, can help to be proactive in developing a strong cyber strategy. Combining that analysis with the ability to analyze the latest information and trends in cyber security, is the key to using Cyber Threat Intelligence to strengthening your cyber security framework.
Corporate Intelligence, or Competitive Intelligence, is the “process of collecting and analyzing information about competitors’ strengths and weaknesses in a legal and ethical manner to enhance business decision-making.” The key word here is ethical. Corporate Intelligence must be gathered through legal means.
In reality, whether focusing on a government definition or corporate, cyber intelligence is really the means taken to gain an advantage against your adversaries. In the corporate world, the adversaries are competitors that are competing to stay in business and be profitable. Intelligence is used to stay one step ahead of adversaries, and in the case of Cyber Intelligence, it is used to protect systems and data from outside parties that would use it to cause harm to the business.
Cyber threat intelligence will allow an organization to gather intelligence based on analyzing the cyber risk environment, and using that intelligence to alter the cyber threat landscape. Using gathered intelligence can help to anticipate cyber attack before they occur and be able to identify and respond quickly when an attack occurs.
Past breaches like the Sony hack and the WannaCry Malware have shown that major threats come into the cyber landscape in an instant. Using resources to understand where past organizations have failed, and where your own systems are vulnerable, can help to be proactive in developing a strong cyber strategy. Combining that analysis with the ability to analyze the latest information and trends in cyber security, is the key to using Cyber Threat Intelligence to strengthening your cyber security framework.
Adversarial Threat Assessment
This was a adversarial assessment report that was created to be given to C-suite executive level management. This report was meant to use ethical and legal means to identify a primary competitor and to gather intelligence on the threat of this direct competitor. For my assignment, I performed an analysis on Tesla Inc., as I was operating in an organization in the electric car industry.
assignment_3_adversarial_threat_assessment_-_sean_ahlgren.docx | |
File Size: | 50 kb |
File Type: | docx |