Cybersecurity Threat Intelligence and International Security
Author(s): Kutub Thakur , Sadia Ismat , Abu Kamruzzaman , Muath Obaidat
Edition: 1
Copyright: 2023
Pages: 298
Edition: 1
Copyright: 2023
Pages: 296
Choose Your Platform | Help Me Choose
Preface
Authors’ Biographies
Chapter 1 – Threat Intelligence: Past, Present, and Future
Introduction to Threat Intelligence
Importance of Threat Intelligence in International Security
Types of Threat Intelligence
Human Intelligence
Open-Source Intelligence
Signal Intelligence
Financial Intelligence
Market Intelligence
Geospatial Intelligence
Cyber Intelligence
Technology Intelligence
Threat Intelligence in the Past
Threat Intelligence in the Present
Threat Intelligence in the Future
Different Types of Powers
Hard Power
Soft Power
Cyber Power
Chapter 2 – Cyber Threat Intelligence
Introduction to Cyber Threat Intelligence
Functions of CTI
Objectives of CTI
Cycle of CTI
Principle of CTI
CTI Levels
Sources of CTI
Types of CTI
Strategic TI
Tactical TI
Technical TI
Operational TI
Major Steps for Effective Use of CTI
The Ways Organizations Implement CTI
Security Operation Center
Vulnerability Management
Strategy Development
Employee Training
Investigation and Response
Risk Assessment
Table Scenario and Resilience Exercises
Standard Compliance
Effective Software Development
Chapter 3 – Cyber Threats to International Security
International Security
Top Theoretical Approaches to International Security
Realism Approach
Classical Realism Approach
Neorealism Approach
Liberalism Approach
Economic Liberalism Approach
Liberal Institutionalism Approach
Constructivism Approach
Top Emerging Domains/Lenses of International Security
Globalization Perspective
Human Security Perspective
Securitization Perspective
Role of Cybersecurity in General Types of Threats to International Security
Health Pandemic
International Migration
Environmental Trouble
Electromagnetic Fields
Natural Resources
Major Types of Cyber Threats to National/International Security
Cyber War
Economic Espionage
Military Espionage
Cyber Crime
Cyberterrorism
Sources of Cyber Threats to International Security
Human Agents
Cyber Hacking
Decentralized Technologies
Deep Web and Dark Web
Propaganda of Misinformation
Chapter 4 – Top Categories of International Cybersecurity Threats
Categories of Cyber Threats to International Security
Military Threats
Nonmilitary Threats
Types of Military Threats
Cyber Intelligence on Military Strategies
Cyber Intelligence on Military Projects and Technology
Cyber Intelligence on Military Capability
Cyber Psychological Warfare
Attacking Military Cyber Infrastructure
Dominating Command and Control Systems
Cyber Diplomacy for Dissidents
Military Operations Disruptions
Types of Nonmilitary Threats
Basic Service Disruptions
Communication Service Interruption
Sensitive Business Data Theft
Intellectual Property Infringement
Financial Damage Attacks
Categories of Cyberattacks
Types of Cyber Tools and Techniques for Cyberattacks
Malwares
Denial of Service
Phishing
Social Engineering
Man in the Middle
Domain Name System Tunneling
Zero-Day Attack
Structured Query Language Injection
Credential-Based Attack
Botnet Attacks
Cross-Site Scripting Attack
Watering Hole Attack
Chapter 5 – Global Cyber Intelligence Cooperation
Introduction
Importance of Cybersecurity Cooperation
Principle of Cyber Intelligence Cooperation
Fundamental Articles of Cyber Intelligence Sharing
Different International Cooperation Groups
International Military Cybersecurity Organizations
United States Cyber Command, USA
Information Operation Troops, Russian Federation
People’s Liberation Army Strategic Support Force, China
Joint Forces Cyber Group, UK
Centers of Excellence, NATO
Information Warfare Division, Australia
Cyber Defense Command, France
Defense Cyber Agency, India
International Nonmilitary Cybersecurity Organizations
United Nations Organization
Internet Governance Forum
Messaging, Malware, and Mobile Anti-Abuse Working Group
Internet Corporation for Assigned Names and Numbers
Forum for Incident Response Security Teams
Cooperative Cyber Defense and Center of Excellence
International Police
Internet Society
Anti-Phishing Working Group
The Open Web Application Security Project
International Industry Standards Organizations
International Telecommunication Union
Institute of Electronic and Electrical Engineering
International Standard Organization
Internet Engineering Task Force
Center for Internet Security
Chapter 6 – Top Challenges to International Cybersecurity Cooperation
Challenges in Proper Sharing of Cybersecurity Intelligence
Lack of Global Legislation
Conflict of Interest
Ideological Division
Divided World in Multipartisan Factions
Vested Interest Groups
Lack of Responsibility Ownership
Fundamentalist Groups
Chapter 7 – Top Tool Used for Cyber Threat Intelligence
CTI Tool
Top Threat Intelligence Tools in Market
IBM X-Force Exchange
Components of X-Force Exchange Solution
Customer Use Cases Workflow
FireEye Threat Intelligence
8 FireEye Top Tools and Service Modules
FireEye Extended Detection and Response
AlienVault Unified Security Management Anywhere
Main Features and Capabilities
How Does It Work?
CrowdStrike Falcon
Major Products and Services of CrowdStrike Falcon
Additional Products and Services
Symantec DeepSight Intelligence
Symantec Global Intelligence Network
Features of DeepSight Intelligence
LookingGlass Cyber Solutions
Main Threat Intelligence Modules
Scout Prime Module
Scout Threat Module
LogRhythm Threat Intelligence
LogRhythm Threat Intelligence Ecosystem
SolarWinds SEM Platform
Salient Features of SolarWinds SEM
Anomali ThreatStream
Salient Features of Anomali ThreatStream
Cisco Threat Intelligence Director Platform
Salient Features of Cisco Threat Intelligence Director
RSA NetWitness Suite
Salient Features of RSA NetWitness Suite
Bitdefender Advanced Threat Intelligence
Main Features of Bitdefender Advanced Threat Intelligence
Chapter 8 – Problems in Finding Right Cyber Threat Intelligence
Introduction
Challenges in Obtaining CTI at Organization Level
Challenges in Sharing CTI Among Stakeholders
Major Problems in Obtaining Right Intelligence in Global Perspectives
9 Technical Challenges
Commercial Challenges
Political Challenges
Legal Challenges
Ideological Challenges
Miscellaneous Challenges
Work and National Culture Factors
Huge Landscape
Unknown Enemy
Incomplete Data
Morality
Uniform Authority of Access
References
Kutub Thakur is director of NJCU Center for cybersecurity and assistant professor and director of Cybersecurity Program at New Jersey City University. He worked for various private and public entities such as United Nations, New York University, Lehman Brothers, Barclays Capital, ConEdison, City University of New York, and Metropolitan Transport Authority. He received his PhD in computer science with specialization in cybersecurity from the Pace University, New York; MS in engineering electrical and computer control systems from University of Wisconsin; and BS and AAS in computer systems technology from the City University of New York (CUNY). He reviewed many prestigious journals and published several papers in reputable journals and conferences. His research interests include digital forensics, network security, machine learning, Internet of Things (IoT) security, privacy, and user behavior. He has served and is serving as the program chair for many conferences and workshops. He is also currently supervising (also, has supervised) many graduate and doctoral students for their theses, proposals, and dissertations in the field of cybersecurity.
Sadia Ismat has been serving government agencies for the past two decades. She has held multiple executive positions. Currently, she is working as a chief information security officer (CISO) for the Department of Finance, New York City's largest financial municipal agency that has a collective revenue annually of $65 billion. She has worked for various state and city agencies, providing consulting services to government and private firms throughout her career. She is a regular contributor and speaker in cybersecurity conferences discussing cybersecurity and women in cybersecurity. She has published research works encompassing federal compliance and biometric technology. She also works as an adjunct professor to various city and private universities.
Abu Kamruzzaman is currently full-time cyber security assistant professor at Bronx C. College under the City University of New York (CUNY). Abu research interests include data science, cybersecurity, machine learning, quantum computing, and cloud computing. He has taught undergraduate and graduate level computing courses on various campuses in NYC since 2001. He has also served in the dissertation committees for computer science PhD students and DPS doctoral program at Pace University, New York. He has maintained 22 years of professional experiences in multiple public entities building and leading projects for mobile applications, enterprise applications, web applications, databases, and data analytics in both Microsoft and Linux platforms with 500K+ active users and 20M+ historic users. He has multiple publications and journals, including IEEE. He has presented and chaired multiple conferences nationally and internationally. He is the recipient of multiple awards for his extraordinary accomplishments.
Muath Obaidat is associate professor of computer science and information security at John Jay College of Criminal Justice of the City University of New York and a researcher at the Center for Cybercrime Studies. Also, he is a graduate faculty in the master of science digital forensics and cyber security program and doctoral faculty of the computer science department at the Graduate School and University Center of the City University of New York. He received his PhD in electrical engineering from the Department of Electrical Engineering at the Graduate Center of the City University of New York. He has a master’s in computer engineering from New Jersey Institute of Technology (NJIT) and graduated in computer science from Monmouth University. He has numerous scientific article publications in journals and respected conference proceedings. His research interests lie in the area of networking and cybersecurity including wireless security, digital forensics, ubiquitous IoT security and privacy, and cyber threat intelligence. He serves on multiple conferences and workshops and organizing committees. In addition, he is a peer reviewer for many international highimpact journals. He is also a senior member of the IEEE.
Preface
Authors’ Biographies
Chapter 1 – Threat Intelligence: Past, Present, and Future
Introduction to Threat Intelligence
Importance of Threat Intelligence in International Security
Types of Threat Intelligence
Human Intelligence
Open-Source Intelligence
Signal Intelligence
Financial Intelligence
Market Intelligence
Geospatial Intelligence
Cyber Intelligence
Technology Intelligence
Threat Intelligence in the Past
Threat Intelligence in the Present
Threat Intelligence in the Future
Different Types of Powers
Hard Power
Soft Power
Cyber Power
Chapter 2 – Cyber Threat Intelligence
Introduction to Cyber Threat Intelligence
Functions of CTI
Objectives of CTI
Cycle of CTI
Principle of CTI
CTI Levels
Sources of CTI
Types of CTI
Strategic TI
Tactical TI
Technical TI
Operational TI
Major Steps for Effective Use of CTI
The Ways Organizations Implement CTI
Security Operation Center
Vulnerability Management
Strategy Development
Employee Training
Investigation and Response
Risk Assessment
Table Scenario and Resilience Exercises
Standard Compliance
Effective Software Development
Chapter 3 – Cyber Threats to International Security
International Security
Top Theoretical Approaches to International Security
Realism Approach
Classical Realism Approach
Neorealism Approach
Liberalism Approach
Economic Liberalism Approach
Liberal Institutionalism Approach
Constructivism Approach
Top Emerging Domains/Lenses of International Security
Globalization Perspective
Human Security Perspective
Securitization Perspective
Role of Cybersecurity in General Types of Threats to International Security
Health Pandemic
International Migration
Environmental Trouble
Electromagnetic Fields
Natural Resources
Major Types of Cyber Threats to National/International Security
Cyber War
Economic Espionage
Military Espionage
Cyber Crime
Cyberterrorism
Sources of Cyber Threats to International Security
Human Agents
Cyber Hacking
Decentralized Technologies
Deep Web and Dark Web
Propaganda of Misinformation
Chapter 4 – Top Categories of International Cybersecurity Threats
Categories of Cyber Threats to International Security
Military Threats
Nonmilitary Threats
Types of Military Threats
Cyber Intelligence on Military Strategies
Cyber Intelligence on Military Projects and Technology
Cyber Intelligence on Military Capability
Cyber Psychological Warfare
Attacking Military Cyber Infrastructure
Dominating Command and Control Systems
Cyber Diplomacy for Dissidents
Military Operations Disruptions
Types of Nonmilitary Threats
Basic Service Disruptions
Communication Service Interruption
Sensitive Business Data Theft
Intellectual Property Infringement
Financial Damage Attacks
Categories of Cyberattacks
Types of Cyber Tools and Techniques for Cyberattacks
Malwares
Denial of Service
Phishing
Social Engineering
Man in the Middle
Domain Name System Tunneling
Zero-Day Attack
Structured Query Language Injection
Credential-Based Attack
Botnet Attacks
Cross-Site Scripting Attack
Watering Hole Attack
Chapter 5 – Global Cyber Intelligence Cooperation
Introduction
Importance of Cybersecurity Cooperation
Principle of Cyber Intelligence Cooperation
Fundamental Articles of Cyber Intelligence Sharing
Different International Cooperation Groups
International Military Cybersecurity Organizations
United States Cyber Command, USA
Information Operation Troops, Russian Federation
People’s Liberation Army Strategic Support Force, China
Joint Forces Cyber Group, UK
Centers of Excellence, NATO
Information Warfare Division, Australia
Cyber Defense Command, France
Defense Cyber Agency, India
International Nonmilitary Cybersecurity Organizations
United Nations Organization
Internet Governance Forum
Messaging, Malware, and Mobile Anti-Abuse Working Group
Internet Corporation for Assigned Names and Numbers
Forum for Incident Response Security Teams
Cooperative Cyber Defense and Center of Excellence
International Police
Internet Society
Anti-Phishing Working Group
The Open Web Application Security Project
International Industry Standards Organizations
International Telecommunication Union
Institute of Electronic and Electrical Engineering
International Standard Organization
Internet Engineering Task Force
Center for Internet Security
Chapter 6 – Top Challenges to International Cybersecurity Cooperation
Challenges in Proper Sharing of Cybersecurity Intelligence
Lack of Global Legislation
Conflict of Interest
Ideological Division
Divided World in Multipartisan Factions
Vested Interest Groups
Lack of Responsibility Ownership
Fundamentalist Groups
Chapter 7 – Top Tool Used for Cyber Threat Intelligence
CTI Tool
Top Threat Intelligence Tools in Market
IBM X-Force Exchange
Components of X-Force Exchange Solution
Customer Use Cases Workflow
FireEye Threat Intelligence
8 FireEye Top Tools and Service Modules
FireEye Extended Detection and Response
AlienVault Unified Security Management Anywhere
Main Features and Capabilities
How Does It Work?
CrowdStrike Falcon
Major Products and Services of CrowdStrike Falcon
Additional Products and Services
Symantec DeepSight Intelligence
Symantec Global Intelligence Network
Features of DeepSight Intelligence
LookingGlass Cyber Solutions
Main Threat Intelligence Modules
Scout Prime Module
Scout Threat Module
LogRhythm Threat Intelligence
LogRhythm Threat Intelligence Ecosystem
SolarWinds SEM Platform
Salient Features of SolarWinds SEM
Anomali ThreatStream
Salient Features of Anomali ThreatStream
Cisco Threat Intelligence Director Platform
Salient Features of Cisco Threat Intelligence Director
RSA NetWitness Suite
Salient Features of RSA NetWitness Suite
Bitdefender Advanced Threat Intelligence
Main Features of Bitdefender Advanced Threat Intelligence
Chapter 8 – Problems in Finding Right Cyber Threat Intelligence
Introduction
Challenges in Obtaining CTI at Organization Level
Challenges in Sharing CTI Among Stakeholders
Major Problems in Obtaining Right Intelligence in Global Perspectives
9 Technical Challenges
Commercial Challenges
Political Challenges
Legal Challenges
Ideological Challenges
Miscellaneous Challenges
Work and National Culture Factors
Huge Landscape
Unknown Enemy
Incomplete Data
Morality
Uniform Authority of Access
References
Kutub Thakur is director of NJCU Center for cybersecurity and assistant professor and director of Cybersecurity Program at New Jersey City University. He worked for various private and public entities such as United Nations, New York University, Lehman Brothers, Barclays Capital, ConEdison, City University of New York, and Metropolitan Transport Authority. He received his PhD in computer science with specialization in cybersecurity from the Pace University, New York; MS in engineering electrical and computer control systems from University of Wisconsin; and BS and AAS in computer systems technology from the City University of New York (CUNY). He reviewed many prestigious journals and published several papers in reputable journals and conferences. His research interests include digital forensics, network security, machine learning, Internet of Things (IoT) security, privacy, and user behavior. He has served and is serving as the program chair for many conferences and workshops. He is also currently supervising (also, has supervised) many graduate and doctoral students for their theses, proposals, and dissertations in the field of cybersecurity.
Sadia Ismat has been serving government agencies for the past two decades. She has held multiple executive positions. Currently, she is working as a chief information security officer (CISO) for the Department of Finance, New York City's largest financial municipal agency that has a collective revenue annually of $65 billion. She has worked for various state and city agencies, providing consulting services to government and private firms throughout her career. She is a regular contributor and speaker in cybersecurity conferences discussing cybersecurity and women in cybersecurity. She has published research works encompassing federal compliance and biometric technology. She also works as an adjunct professor to various city and private universities.
Abu Kamruzzaman is currently full-time cyber security assistant professor at Bronx C. College under the City University of New York (CUNY). Abu research interests include data science, cybersecurity, machine learning, quantum computing, and cloud computing. He has taught undergraduate and graduate level computing courses on various campuses in NYC since 2001. He has also served in the dissertation committees for computer science PhD students and DPS doctoral program at Pace University, New York. He has maintained 22 years of professional experiences in multiple public entities building and leading projects for mobile applications, enterprise applications, web applications, databases, and data analytics in both Microsoft and Linux platforms with 500K+ active users and 20M+ historic users. He has multiple publications and journals, including IEEE. He has presented and chaired multiple conferences nationally and internationally. He is the recipient of multiple awards for his extraordinary accomplishments.
Muath Obaidat is associate professor of computer science and information security at John Jay College of Criminal Justice of the City University of New York and a researcher at the Center for Cybercrime Studies. Also, he is a graduate faculty in the master of science digital forensics and cyber security program and doctoral faculty of the computer science department at the Graduate School and University Center of the City University of New York. He received his PhD in electrical engineering from the Department of Electrical Engineering at the Graduate Center of the City University of New York. He has a master’s in computer engineering from New Jersey Institute of Technology (NJIT) and graduated in computer science from Monmouth University. He has numerous scientific article publications in journals and respected conference proceedings. His research interests lie in the area of networking and cybersecurity including wireless security, digital forensics, ubiquitous IoT security and privacy, and cyber threat intelligence. He serves on multiple conferences and workshops and organizing committees. In addition, he is a peer reviewer for many international highimpact journals. He is also a senior member of the IEEE.