The Intelligence Handbook A Roadmap for Building an Intelligence Led Security Program 4th Edition Cyberedge Group download pdf
The Intelligence Handbook A Roadmap for Building an Intelligence Led Security Program 4th Edition Cyberedge Group download pdf
com
https://ebookmeta.com/product/the-intelligence-handbook-a-
roadmap-for-building-an-intelligence-led-security-
program-4th-edition-cyberedge-group/
OR CLICK HERE
DOWLOAD NOW
https://ebookmeta.com/product/building-a-cyber-risk-management-
program-evolving-security-for-the-digital-age-brian-allen/
ebookmeta.com
https://ebookmeta.com/product/explainable-artificial-intelligence-for-
cyber-security-mohiuddin-ahmed/
ebookmeta.com
https://ebookmeta.com/product/security-and-intelligence-in-a-changing-
world-new-perspectives-for-the-1990s-a-stuart-farson-editor/
ebookmeta.com
https://ebookmeta.com/product/dead-box-set-3-books-7-9-tw-brown-et-el/
ebookmeta.com
https://ebookmeta.com/product/thrown-to-her-wolves-1st-edition-margo-
bond-collins/
ebookmeta.com
https://ebookmeta.com/product/costa-rica-7th-edition-insight-guides/
ebookmeta.com
https://ebookmeta.com/product/basics-of-statistical-physics-3rd-
edition-harald-j-w-muller-kirsten/
ebookmeta.com
https://ebookmeta.com/product/avian-immunology-3rd-edition-bernd-
kaspers/
ebookmeta.com
F 8 Crusader Vietnam 1963 73 1st Edition Peter E Davies
https://ebookmeta.com/product/f-8-crusader-vietnam-1963-73-1st-
edition-peter-e-davies/
ebookmeta.com
About Recorded Future
Recorded Future is the world’s largest intelligence company.
The Recorded Future Intelligence Platform provides the most
complete coverage across adversaries, infrastructure, and
targets. By combining persistent and pervasive automated
data collection and analytics with human analysis, Recorded
Future provides real-time visibility into the vast digital
landscape and empowers clients to take proactive action
to disrupt adversaries and keep their people, systems,
and infrastructure safe. Headquartered in Boston with
offices and employees around the world, Recorded Future
works with more than 1,400 businesses and government
organizations across 60 countries.
recordedfuture.com
The Intelligence
Handbook
Fourth Edition
Publisher’s Acknowledgements
CyberEdge Group thanks the following individuals for their respective contributions:
Copy Editor: Susan Shuttleworth
Graphic Design: Debbi Stocco
Production Coordinator: Jon Friedman
Acknowledgements
Chapters at a Glance
Section 1: What Is Intelligence for Security
Teams?
Chapter 1, “What Is Intelligence for Security Teams,”
outlines the value of intelligence and the characteristics of
successful intelligence programs.
Chapter 2, “Types and Sources,” discusses the differences
between operational and strategic intelligence, as well as the
roles of data feeds and the dark web.
Chapter 3, “The Intelligence Life Cycle,” examines
the phases of the intelligence life cycle and the relationship
between tools and human analysts.
Section 2: Applications of Intelligence for
Security Teams
Chapter 4, “SecOps Intelligence Part 1: Triage,”
explores how intelligence provides context for triage and
enables security operations teams to make better, faster
decisions.
Chapter 5, “SecOps Intelligence Part 2: Response,”
discusses how intelligence minimizes reactivity in incident
response and presents four use cases.
Chapter 6, “Vulnerability Intelligence,” examines how
intelligence enables practitioners to prioritize vulnerabilities
based on true risk to the organization.
Chapter 7, “Threat Intelligence Part 1: Understanding
Attackers,” explains the value of researching attacker tactics,
techniques, and procedures (TTPs).
Chapter 8, “Threat Intelligence Part 2: Risk
Analysis,” analyzes the value of risk models and how intelli-
gence provides hard data about attack probabilities and costs.
Chapter 9, “Third-Party Intelligence,” explores how
intelligence is used to assess supply-chain partners and reduce
third-party risk.
Chapter 10, “Brand Intelligence,” reviews different forms
of digital risks to brands and how intelligence empowers secu-
rity teams to defend their organization’s reputation.
xii | The Intelligence Handbook
Icon Glossary
TIP
Tips provide practical advice you may want to apply in your
own organization.
DON’T FORGET
When you see this icon, take note, as the related content con-
tains key information that you’ll want to remember.
CAUTION
Proceed with caution, because it may prove costly to you and
your organization if you don’t.
TECH TALK
Content associated with this icon is more technical in nature
and is intended for IT and security practitioners.
ON THE WEB
Want to learn more? Follow the corresponding URL to dis-
cover additional content online.
Section 1: What Is Intelligence
for Security Teams?
Chapter 1
What Is Intelligence
for Security Teams?
In this chapter
Understand why intelligence is important for security teams
Review characteristics of successful intelligence programs
Learn who benefits from using intelligence
Intelligence: Actionable
Facts and Insights
When people speak of intelligence, sometimes they are refer-
ring to certain types of facts and insights, and other times to
the process that produces them. Let’s look at the first case.
Data feeds that are never used and reports that are never read
are not intelligence. Neither is information, no matter how
accurate or insightful, if it is provided to someone who can’t
interpret it correctly or isn’t in a position to act on it.
Chapter 1: What Is Intelligence for Security Teams | 7
1. A collaborative process
and framework
In many organizations, intelligence efforts are siloed. For
example, the security operations (SecOps), fraud prevention,
and third-party risk teams may have their own analysts and
tools for gathering and analyzing intelligence. They may
answer to completely independent reporting chains. This
leads to waste, duplication, and an inability to share analysis
and intelligence. Silos also make it impossible to assess risk
across the organization and to direct security resources where
they will have the greatest impact. Intelligence programs need
to share a common process and framework, enable broad
access to insights and operational workflows, encourage a
“big picture” view of risk, and account for the allocation of
resources.
2. 360-degree visibility
Because cyber threats may come from anywhere, intelligence
programs need visibility within and outside the enterprise,
including:
3. Extensive automation
and integration
Because there is so much data and information to capture,
correlate, and process, an intelligence program needs a high
degree of automation to reduce manual efforts and produce
meaningful results quickly. To add context to initial findings
and effectively disseminate intelligence, successful intelligence
programs must also integrate with many types of security
solutions, such as security dashboards, security information
and event management solutions (SIEMs), vulnerability
management systems, endpoint and XDR products, firewalls,
and security orchestration, automation and response (SOAR)
tools.
Operational intelligence
Operational intelligence is knowledge about ongoing
cyberattacks, events, and campaigns. It provides specialized
insights that enable the individuals that use it to understand
the nature, intent, and timing of specific attacks as they are
occurring.
Operational intelligence is sometimes referred to as techni-
cal security intelligence or technical threat intel-
ligence, because it usually includes technical information
about attacks, such as which attack vectors are being used,
12 | The Intelligence Handbook
Strategic intelligence
Strategic intelligence provides a broad overview of an
organization’s present and future threat landscape. It informs
resource decisions by security leadership and within security
architecture, application security, and other security develop-
ment projects. The content is generally risk oriented and
presented through reports or briefings.
This kind of intelligence requires human interaction because
it takes analytical thought and creativity to forecast future
trends, for example to evaluate and test new and emerging
adversary TTPs against existing security controls. Pieces of
this process may be automated, but a human mind is required
to complete the exercise.
Good strategic intelligence must provide insight into the risks
associated with certain actions, broad patterns in threat actor
tactics and targets, geopolitical events and trends, and similar
topics.
Chapter 2: Types and Sources | 13
Tafel X
Die Figuren 13, 27, 28 und 29 sind direct nach den Präparaten, die
übrigen nach Microphotogrammen von dem Museumszeichner Hrn.
Geisler auf den Stein gravirt. Die einzelnen Haare sind so geordnet, dass
ähnliche Formen möglichst zusammenstehen, ohne Rücksicht auf die
systematische Verwandtschaft der Arten, denen sie entnommen sind.
1–6 Seitenansichten.
7–11 Flächenansichten.
N . b i v i t t a t u s Hgl. Typisches Haar von dem Feld an der
7Schnauzenspitze. Die Endplatte ist in der Gravur viel zu
dunkel ausgefallen. 46mal vergrössert. Seite 37, 38.
N . l i8m b a t u s (Ptrs.). Ziemlich typisches Haar von den
Wülsten der Oberlippe. Bezüglich der Endplatte gilt das
Gleiche wie für Fig. 7. 46mal vergrössert. Seite 37, 38.
N 9–11
. p l i c a t u s (Buch. Ham.). Haare von den seitlichen
Theilen der Oberlippe. Mit Ausnahme von 9 a sämmtlich 46mal
vergrössert. 9 Haar von mittlerer Ausbildung 1, 9 a die Endplatte
desselben (190mal vergrössert). Seite 38. 10, 11 wenig
ausgeprägte Formen. Seite 37, 38.
12,
N .12bai v i t t a t u s Hgl. Borste oberhalb der Nase, zu den
modificirten Haaren der „ersten Gruppe“ gehörig, mit Anhang
an der Spitze. 12 ganzes Haar, 46mal vergrössert, 12 a oberes
Ende desselben, 100mal vergrössert. Seite 36, 38.
N. b 13r a c h y p t e r u s (Ptrs.). Endplatte eines mittleren
Spatelhaars von der Region oberhalb seitwärts der Nase, mit
Anhang, dessen Endglied abgerissen ist. Flächenansicht.
190mal vergrössert. Seite 38.
N14,
. b15i v i t t a t u s Hgl. Lange, wenig typische Spatelhaare der
Region median oberhalb der Nase. 14 von der Fläche, 15 von
der Seite. In letzterer Figur ist die Zackung der Oberfläche
versehentlich zu stark wiedergegeben. 46mal vergrössert.
Seite 37. [54]
N16,
. p17l i c a t u s (Buch. Ham.). Spatelhaare von den seitlichen
Theilen der Oberlippe, von der Seite gesehen. 46mal
vergrössert. 16 Haar mittlerer Form, etwa entsprechend Fig.
9 2. Seite 37. 17 sehr wenig ausgeprägtes Haar, etwa wie das
der Fig. 11. Seite 37, 38.
N. b 18i v i t t a t u s Hgl. Borste vom Gesichte, zur „ersten
Gruppe“ gehörig. 46mal vergrössert. Seite 36.
N. a 19s t r o l a b i e n s i s A. B. M. Borste von der Oberlippe, zur
„ersten Gruppe“ gehörig. 46mal vergrössert. Seite 36.
C20–25
h e i r o m e l e s t o r q u a t u s Horsf.
Borste20 vom Gesichte, zur „ersten Gruppe“ gehörig.
46mal vergrössert. Seite 48.
Körperhaare von der Brust. Seite 35. a–d längere und
21 a–ekürzere ganze Haare, 46mal vergrössert; e
ein Stück aus der Mitte von a, 120mal vergrössert.
modificirte
22, 23 Spatelhaare des Feldes vorn an der
Schnauze, Flächenansicht. 46mal vergrössert.
Seite 39.
24, 25 von den seitlichen Theilen des Gesichts 2,
Borsten
in die „zweite Gruppe“ gehörig. 46mal vergrössert.
Seite 39.
N
26,
. b27r a s i l i e n s i s Is. Geoffr. Borsten der „zweiten Gruppe“.
46mal vergrössert. Seite 39. 26 von den Wülsten der
Oberlippe, 27 oberhalb der Nase.
N . s28a r a s i n o r u m A. B. M. Habitusbild der Spatelhaare des
Feldes unterhalb der Nasenlöcher. Der Pfeil am Rande deutet
die Medianebene und die Richtung nach der Nase an. Die
Endknöpfchen erscheinen in der Abbildung zu flach. Geringe
Vergrösserung (Zeiss, Binocular). Seite 36.
M o l29
o s s u s r u f u s o b s c u r u s (Geoffr.). Dasselbe wie von
vorigem. Der Pfeil am Rand hat die gleiche Bedeutung wie
dort. Vergrösserung dieselbe. Seite 36.
N y c30
t i n o m u s a s t r o l a b i e n s i s A. B. M. Eine Parthie
Körperhaar von der Brust, die verschiedenen Abschnitte
einzelner Haare zeigend. 110mal vergrössert. Seite 34.
Tafel XI
[Inhalt]
c. ⅓ nat. Grösse
¾ nat. Grösse
Abh. Ber. K. Zool. Anthr. Ethn. Mus. Dresden 1898/9 Nr. 7
Meyer: Säugethiere Celébes II. Taf. III
1–2 T a r s i u s f u s c u s Fisch.-Waldh. 3 T a r s i u s s a n g i r e n s i s A. B.
Meyer
1 P t e r o p u s w a l l a c e i Gr. 2 V e s p e r u g o p e t e r s i n. sp. 3 V e s p e r u g o
m i n a h a s s a e n. sp. 4–6 N y c t i n o m u s s a r a s i n o r u m n. sp.
nat. Grösse
nat. Grösse
Inhaltsverzeichniss V
Tafelerklärung VII
1. Macacus maurus F. Cuv. 1
2-3. Macacus cynomolgus L. und philippinensis Js. Geoffr. 4
4-5. Cynopithecus niger (Desm.) und nigrescens (Temm.) 5
6. Tarsius fuscus Fisch.-Waldh. 8
7. Tarsius sangirensis n. sp. 9
8. Tarsius philippensis A. B. Meyer 9
9. Tarsius spectrum (Pall.) 9
10. Paradoxurus musschenbroeki Schl. 10
11. Bubalus mindorensis Heude 12
12. Babirusa alfurus Less. 15
Vorkommen und damit in Verbindung stehende Fragen. 15
Zahnformel. 22
Bewehrung der Sau. 23
13. Sciurus tonkeanus n. sp. 25
14. Sciurus leucomus Müll. Schl. 25
15. Sciurus rosenbergi Jent. 26
16. Sciurus tingahi n. sp. 27
17. Sciurus steeri Gthr. 27
18. Sciurus mindanensis Steere 28
19. Sciurus samarensis Steere 29
20. Phlœomys cumingi Wtrh. 29
21. Crateromys schadenbergi (A. B. Meyer) 31
22. Phalanger celebensis (Gr.) 33
23. Phalanger sangirensis n. sp. 34
24. Phalanger ursinus (Temm.) 34
Index. 35
Tafeln
Inhaltsverzeichniss III
Tafelerklärung V
Alphabetischer Index VII
Addenda VIII
Einleitung 1
Primates Cercopithecidae 2
1. Macacus maurus F. Cuv. 2
Macacus tonkeanus n. sp. 3
2. Cynopithecus niger (Desm.) 4
3. Cynopithecus niger nigrescens (Temm.) 4
Tarsiidae 4
4. Tarsius fuscus Fisch.-Waldh. 4
Chiroptera Megachiroptera Pteropidae 5
5. Pteropus wallacei Gr. 5
6. Pteropus alecto Temm. 5
7. Pteropus hypomelanus Temm. 6
8. Pteropus mackloti Temm. (Pteropus celebensis Schl.) 6
9. Xantharpyia minor (Dobs.) 6
10. Cynopterus latidens Dobs. 7
Anmerkung 7
11. Uronycteris cephalotes (Pall.) 8
12. Cephalotes peroni Geoffr. 9
13. Carponycteris australis (Ptrs.) 10
Microchiroptera Rhinolophidae 11
14. Rhinolophus minor Horsf. 11
15. Hipposiderus diadema (Geoffr.) 11
Nycteridae 12
16. Megaderma spasma (L.) 12
Vespertilionidae 12
17. Vesperus pachypus (Temm.) 12
18. Vesperugo petersi n. sp. 13
Anmerkung 14
Vesperugo papuanus orientalis. 14
19. Vesperugo minahassae n. sp. 14
20. Vespertilio muricola Hdgs. 16
Emballonuridae Molossi 16
21. Nyctinomus sarasinorum n. sp. 16
Anmerkung 19
Nyctinomus astrolabiensis n. sp. 19
Insectivora Soricidae 20
22. Crocidura fuliginosa (Blyth) 20
Carnivora Viverridae 20
23. Viverra tangalunga Gray 20
24. Paradoxurus hermaphroditus (Schreb.) 20
25. Paradoxurus musschenbroeki Schl. 20
Rodentia Sciuridae 21
26. Sciurus leucomus Müll. Schl. 21
27. Sciurus leucomus occidentalis A. B. M. 21
28. Sciurus sarasinorum A. B. M. 21
29. Sciurus murinus Müll. Schl. 21
30. Sciurus rubriventer Müll. Schl. 22
Muridae 22
31. Mus rattus L. 22
32. Mus neglectus Jent. (?) 22
33. Mus ephippium Jent. 23
34. Mus musschenbroeki Jent. 23
35. Mus callitrichus Jent. 24