Cybersecurity Threat Intelligence and International Security

Edition: 1

Copyright: 2023

Pages: 296

Choose Your Format

Choose Your Platform | Help Me Choose

Ebook

$35.00

ISBN 9798765744888

Details Electronic Delivery EBOOK 180 days

Preface

Authors’ Biographies

Chapter 1 – Threat Intelligence: Past, Present, and Future

Introduction to Threat Intelligence

Importance of Threat Intelligence in International Security

Types of Threat Intelligence

Human Intelligence

Open-Source Intelligence

Signal Intelligence

Financial Intelligence

Market Intelligence

Geospatial Intelligence

Cyber Intelligence

Technology Intelligence

Threat Intelligence in the Past

Threat Intelligence in the Present

Threat Intelligence in the Future

Different Types of Powers

Hard Power

Soft Power

Cyber Power

Chapter 2 – Cyber Threat Intelligence

Introduction to Cyber Threat Intelligence

Functions of CTI

Objectives of CTI

Cycle of CTI

Principle of CTI

CTI Levels

Sources of CTI

Types of CTI

Strategic TI

Tactical TI

Technical TI

Operational TI

Major Steps for Effective Use of CTI

The Ways Organizations Implement CTI

Security Operation Center

Vulnerability Management

Strategy Development

Employee Training

Investigation and Response

Risk Assessment

Table Scenario and Resilience Exercises

Standard Compliance

Effective Software Development

Chapter 3 – Cyber Threats to International Security

International Security

Top Theoretical Approaches to International Security

Realism Approach

Classical Realism Approach

Neorealism Approach

Liberalism Approach

Economic Liberalism Approach

Liberal Institutionalism Approach

Constructivism Approach

Top Emerging Domains/Lenses of International Security

Globalization Perspective

Human Security Perspective

Securitization Perspective

Role of Cybersecurity in General Types of Threats to International Security

Health Pandemic

International Migration

Environmental Trouble

Electromagnetic Fields

Natural Resources

Major Types of Cyber Threats to National/International Security

Cyber War

Economic Espionage

Military Espionage

Cyber Crime

Cyberterrorism

Sources of Cyber Threats to International Security

Human Agents

Cyber Hacking

Decentralized Technologies

Deep Web and Dark Web

Propaganda of Misinformation

Chapter 4 – Top Categories of International Cybersecurity Threats

Categories of Cyber Threats to International Security

Military Threats

Nonmilitary Threats

Types of Military Threats

Cyber Intelligence on Military Strategies

Cyber Intelligence on Military Projects and Technology

Cyber Intelligence on Military Capability

Cyber Psychological Warfare

Attacking Military Cyber Infrastructure

Dominating Command and Control Systems

Cyber Diplomacy for Dissidents

Military Operations Disruptions

Types of Nonmilitary Threats

Basic Service Disruptions

Communication Service Interruption

Sensitive Business Data Theft

Intellectual Property Infringement

Financial Damage Attacks

Categories of Cyberattacks

Types of Cyber Tools and Techniques for Cyberattacks

Malwares

Denial of Service

Phishing

Social Engineering

Man in the Middle

Domain Name System Tunneling

Zero-Day Attack

Structured Query Language Injection

Credential-Based Attack

Botnet Attacks

Cross-Site Scripting Attack

Watering Hole Attack

Chapter 5 – Global Cyber Intelligence Cooperation

Introduction

Importance of Cybersecurity Cooperation

Principle of Cyber Intelligence Cooperation

Fundamental Articles of Cyber Intelligence Sharing

Different International Cooperation Groups

International Military Cybersecurity Organizations

United States Cyber Command, USA

Information Operation Troops, Russian Federation

People’s Liberation Army Strategic Support Force, China

Joint Forces Cyber Group, UK

Centers of Excellence, NATO

Information Warfare Division, Australia

Cyber Defense Command, France

Defense Cyber Agency, India

International Nonmilitary Cybersecurity Organizations

United Nations Organization

Internet Governance Forum

Messaging, Malware, and Mobile Anti-Abuse Working Group

Internet Corporation for Assigned Names and Numbers

Forum for Incident Response Security Teams

Cooperative Cyber Defense and Center of Excellence

International Police

Internet Society

Anti-Phishing Working Group

The Open Web Application Security Project

International Industry Standards Organizations

International Telecommunication Union

Institute of Electronic and Electrical Engineering

International Standard Organization

Internet Engineering Task Force

Center for Internet Security

Chapter 6 – Top Challenges to International Cybersecurity Cooperation

Challenges in Proper Sharing of Cybersecurity Intelligence

Lack of Global Legislation

Conflict of Interest

Ideological Division

Divided World in Multipartisan Factions

Vested Interest Groups

Lack of Responsibility Ownership

Fundamentalist Groups

Chapter 7 – Top Tool Used for Cyber Threat Intelligence

CTI Tool

Top Threat Intelligence Tools in Market

IBM X-Force Exchange

Components of X-Force Exchange Solution

Customer Use Cases Workflow

FireEye Threat Intelligence

8 FireEye Top Tools and Service Modules

FireEye Extended Detection and Response

AlienVault Unified Security Management Anywhere

Main Features and Capabilities

How Does It Work?

CrowdStrike Falcon

Major Products and Services of CrowdStrike Falcon

Additional Products and Services

Symantec DeepSight Intelligence

Symantec Global Intelligence Network

Features of DeepSight Intelligence

LookingGlass Cyber Solutions

Main Threat Intelligence Modules

Scout Prime Module

Scout Threat Module

LogRhythm Threat Intelligence

LogRhythm Threat Intelligence Ecosystem

SolarWinds SEM Platform

Salient Features of SolarWinds SEM

Anomali ThreatStream

Salient Features of Anomali ThreatStream

Cisco Threat Intelligence Director Platform

Salient Features of Cisco Threat Intelligence Director

RSA NetWitness Suite

Salient Features of RSA NetWitness Suite

Bitdefender Advanced Threat Intelligence

Main Features of Bitdefender Advanced Threat Intelligence

Chapter 8 – Problems in Finding Right Cyber Threat Intelligence

Introduction

Challenges in Obtaining CTI at Organization Level

Challenges in Sharing CTI Among Stakeholders

Major Problems in Obtaining Right Intelligence in Global Perspectives

9 Technical Challenges

Commercial Challenges

Political Challenges

Legal Challenges

Ideological Challenges

Miscellaneous Challenges

Work and National Culture Factors

Huge Landscape

Unknown Enemy

Incomplete Data

Morality

Uniform Authority of Access

References

Kutub Thakur

Kutub Thakur is director of NJCU Center for cybersecurity and assistant professor and director of Cybersecurity Program at New Jersey City University. He worked for various private and public entities such as United Nations, New York University, Lehman Brothers, Barclays Capital, ConEdison, City University of New York, and Metropolitan Transport Authority. He received his PhD in computer science with specialization in cybersecurity from the Pace University, New York; MS in engineering electrical and computer control systems from University of Wisconsin; and BS and AAS in computer systems technology from the City University of New York (CUNY). He reviewed many prestigious journals and published several papers in reputable journals and conferences. His research interests include digital forensics, network security, machine learning, Internet of Things (IoT) security, privacy, and user behavior. He has served and is serving as the program chair for many conferences and workshops. He is also currently supervising (also, has supervised) many graduate and doctoral students for their theses, proposals, and dissertations in the field of cybersecurity.

Sadia Ismat

Sadia Ismat has been serving government agencies for the past two decades. She has held multiple executive positions. Currently, she is working as a chief information security officer (CISO) for the Department of Finance, New York City's largest financial municipal agency that has a collective revenue annually of $65 billion. She has worked for various state and city agencies, providing consulting services to government and private firms throughout her career. She is a regular contributor and speaker in cybersecurity conferences discussing cybersecurity and women in cybersecurity. She has published research works encompassing federal compliance and biometric technology. She also works as an adjunct professor to various city and private universities.

Abu Kamruzzaman

Abu Kamruzzaman is currently full-time cyber security assistant professor at Bronx C. College under the City University of New York (CUNY). Abu research interests include data science, cybersecurity, machine learning, quantum computing, and cloud computing. He has taught undergraduate and graduate level computing courses on various campuses in NYC since 2001. He has also served in the dissertation committees for computer science PhD students and DPS doctoral program at Pace University, New York. He has maintained 22 years of professional experiences in multiple public entities building and leading projects for mobile applications, enterprise applications, web applications, databases, and data analytics in both Microsoft and Linux platforms with 500K+ active users and 20M+ historic users. He has multiple publications and journals, including IEEE. He has presented and chaired multiple conferences nationally and internationally. He is the recipient of multiple awards for his extraordinary accomplishments.

Muath Obaidat

Muath Obaidat is associate professor of computer science and information security at John Jay College of Criminal Justice of the City University of New York and a researcher at the Center for Cybercrime Studies. Also, he is a graduate faculty in the master of science digital forensics and cyber security program and doctoral faculty of the computer science department at the Graduate School and University Center of the City University of New York. He received his PhD in electrical engineering from the Department of Electrical Engineering at the Graduate Center of the City University of New York. He has a master’s in computer engineering from New Jersey Institute of Technology (NJIT) and graduated in computer science from Monmouth University. He has numerous scientific article publications in journals and respected conference proceedings. His research interests lie in the area of networking and cybersecurity including wireless security, digital forensics, ubiquitous IoT security and privacy, and cyber threat intelligence. He serves on multiple conferences and workshops and organizing committees. In addition, he is a peer reviewer for many international highimpact journals. He is also a senior member of the IEEE.

Preface

Authors’ Biographies

Chapter 1 – Threat Intelligence: Past, Present, and Future

Introduction to Threat Intelligence

Importance of Threat Intelligence in International Security

Types of Threat Intelligence

Human Intelligence

Open-Source Intelligence

Signal Intelligence

Financial Intelligence

Market Intelligence

Geospatial Intelligence

Cyber Intelligence

Technology Intelligence

Threat Intelligence in the Past

Threat Intelligence in the Present

Threat Intelligence in the Future

Different Types of Powers

Hard Power

Soft Power

Cyber Power

Chapter 2 – Cyber Threat Intelligence

Introduction to Cyber Threat Intelligence

Functions of CTI

Objectives of CTI

Cycle of CTI

Principle of CTI

CTI Levels

Sources of CTI

Types of CTI

Strategic TI

Tactical TI

Technical TI

Operational TI

Major Steps for Effective Use of CTI

The Ways Organizations Implement CTI

Security Operation Center

Vulnerability Management

Strategy Development

Employee Training

Investigation and Response

Risk Assessment

Table Scenario and Resilience Exercises

Standard Compliance

Effective Software Development

Chapter 3 – Cyber Threats to International Security

International Security

Top Theoretical Approaches to International Security

Realism Approach

Classical Realism Approach

Neorealism Approach

Liberalism Approach

Economic Liberalism Approach

Liberal Institutionalism Approach

Constructivism Approach

Top Emerging Domains/Lenses of International Security

Globalization Perspective

Human Security Perspective

Securitization Perspective

Role of Cybersecurity in General Types of Threats to International Security

Health Pandemic

International Migration

Environmental Trouble

Electromagnetic Fields

Natural Resources

Major Types of Cyber Threats to National/International Security

Cyber War

Economic Espionage

Military Espionage

Cyber Crime

Cyberterrorism

Sources of Cyber Threats to International Security

Human Agents

Cyber Hacking

Decentralized Technologies

Deep Web and Dark Web

Propaganda of Misinformation

Chapter 4 – Top Categories of International Cybersecurity Threats

Categories of Cyber Threats to International Security

Military Threats

Nonmilitary Threats

Types of Military Threats

Cyber Intelligence on Military Strategies

Cyber Intelligence on Military Projects and Technology

Cyber Intelligence on Military Capability

Cyber Psychological Warfare

Attacking Military Cyber Infrastructure

Dominating Command and Control Systems

Cyber Diplomacy for Dissidents

Military Operations Disruptions

Types of Nonmilitary Threats

Basic Service Disruptions

Communication Service Interruption

Sensitive Business Data Theft

Intellectual Property Infringement

Financial Damage Attacks

Categories of Cyberattacks

Types of Cyber Tools and Techniques for Cyberattacks

Malwares

Denial of Service

Phishing

Social Engineering

Man in the Middle

Domain Name System Tunneling

Zero-Day Attack

Structured Query Language Injection

Credential-Based Attack

Botnet Attacks

Cross-Site Scripting Attack

Watering Hole Attack

Chapter 5 – Global Cyber Intelligence Cooperation

Introduction

Importance of Cybersecurity Cooperation

Principle of Cyber Intelligence Cooperation

Fundamental Articles of Cyber Intelligence Sharing

Different International Cooperation Groups

International Military Cybersecurity Organizations

United States Cyber Command, USA

Information Operation Troops, Russian Federation

People’s Liberation Army Strategic Support Force, China

Joint Forces Cyber Group, UK

Centers of Excellence, NATO

Information Warfare Division, Australia

Cyber Defense Command, France

Defense Cyber Agency, India

International Nonmilitary Cybersecurity Organizations

United Nations Organization

Internet Governance Forum

Messaging, Malware, and Mobile Anti-Abuse Working Group

Internet Corporation for Assigned Names and Numbers

Forum for Incident Response Security Teams

Cooperative Cyber Defense and Center of Excellence

International Police

Internet Society

Anti-Phishing Working Group

The Open Web Application Security Project

International Industry Standards Organizations

International Telecommunication Union

Institute of Electronic and Electrical Engineering

International Standard Organization

Internet Engineering Task Force

Center for Internet Security

Chapter 6 – Top Challenges to International Cybersecurity Cooperation

Challenges in Proper Sharing of Cybersecurity Intelligence

Lack of Global Legislation

Conflict of Interest

Ideological Division

Divided World in Multipartisan Factions

Vested Interest Groups

Lack of Responsibility Ownership

Fundamentalist Groups

Chapter 7 – Top Tool Used for Cyber Threat Intelligence

CTI Tool

Top Threat Intelligence Tools in Market

IBM X-Force Exchange

Components of X-Force Exchange Solution

Customer Use Cases Workflow

FireEye Threat Intelligence

8 FireEye Top Tools and Service Modules

FireEye Extended Detection and Response

AlienVault Unified Security Management Anywhere

Main Features and Capabilities

How Does It Work?

CrowdStrike Falcon

Major Products and Services of CrowdStrike Falcon

Additional Products and Services

Symantec DeepSight Intelligence

Symantec Global Intelligence Network

Features of DeepSight Intelligence

LookingGlass Cyber Solutions

Main Threat Intelligence Modules

Scout Prime Module

Scout Threat Module

LogRhythm Threat Intelligence

LogRhythm Threat Intelligence Ecosystem

SolarWinds SEM Platform

Salient Features of SolarWinds SEM

Anomali ThreatStream

Salient Features of Anomali ThreatStream

Cisco Threat Intelligence Director Platform

Salient Features of Cisco Threat Intelligence Director

RSA NetWitness Suite

Salient Features of RSA NetWitness Suite

Bitdefender Advanced Threat Intelligence

Main Features of Bitdefender Advanced Threat Intelligence

Chapter 8 – Problems in Finding Right Cyber Threat Intelligence

Introduction

Challenges in Obtaining CTI at Organization Level

Challenges in Sharing CTI Among Stakeholders

Major Problems in Obtaining Right Intelligence in Global Perspectives

9 Technical Challenges

Commercial Challenges

Political Challenges

Legal Challenges

Ideological Challenges

Miscellaneous Challenges

Work and National Culture Factors

Huge Landscape

Unknown Enemy

Incomplete Data

Morality

Uniform Authority of Access

References

Kutub Thakur

Kutub Thakur is director of NJCU Center for cybersecurity and assistant professor and director of Cybersecurity Program at New Jersey City University. He worked for various private and public entities such as United Nations, New York University, Lehman Brothers, Barclays Capital, ConEdison, City University of New York, and Metropolitan Transport Authority. He received his PhD in computer science with specialization in cybersecurity from the Pace University, New York; MS in engineering electrical and computer control systems from University of Wisconsin; and BS and AAS in computer systems technology from the City University of New York (CUNY). He reviewed many prestigious journals and published several papers in reputable journals and conferences. His research interests include digital forensics, network security, machine learning, Internet of Things (IoT) security, privacy, and user behavior. He has served and is serving as the program chair for many conferences and workshops. He is also currently supervising (also, has supervised) many graduate and doctoral students for their theses, proposals, and dissertations in the field of cybersecurity.

Sadia Ismat

Sadia Ismat has been serving government agencies for the past two decades. She has held multiple executive positions. Currently, she is working as a chief information security officer (CISO) for the Department of Finance, New York City's largest financial municipal agency that has a collective revenue annually of $65 billion. She has worked for various state and city agencies, providing consulting services to government and private firms throughout her career. She is a regular contributor and speaker in cybersecurity conferences discussing cybersecurity and women in cybersecurity. She has published research works encompassing federal compliance and biometric technology. She also works as an adjunct professor to various city and private universities.

Abu Kamruzzaman

Abu Kamruzzaman is currently full-time cyber security assistant professor at Bronx C. College under the City University of New York (CUNY). Abu research interests include data science, cybersecurity, machine learning, quantum computing, and cloud computing. He has taught undergraduate and graduate level computing courses on various campuses in NYC since 2001. He has also served in the dissertation committees for computer science PhD students and DPS doctoral program at Pace University, New York. He has maintained 22 years of professional experiences in multiple public entities building and leading projects for mobile applications, enterprise applications, web applications, databases, and data analytics in both Microsoft and Linux platforms with 500K+ active users and 20M+ historic users. He has multiple publications and journals, including IEEE. He has presented and chaired multiple conferences nationally and internationally. He is the recipient of multiple awards for his extraordinary accomplishments.

Muath Obaidat

Muath Obaidat is associate professor of computer science and information security at John Jay College of Criminal Justice of the City University of New York and a researcher at the Center for Cybercrime Studies. Also, he is a graduate faculty in the master of science digital forensics and cyber security program and doctoral faculty of the computer science department at the Graduate School and University Center of the City University of New York. He received his PhD in electrical engineering from the Department of Electrical Engineering at the Graduate Center of the City University of New York. He has a master’s in computer engineering from New Jersey Institute of Technology (NJIT) and graduated in computer science from Monmouth University. He has numerous scientific article publications in journals and respected conference proceedings. His research interests lie in the area of networking and cybersecurity including wireless security, digital forensics, ubiquitous IoT security and privacy, and cyber threat intelligence. He serves on multiple conferences and workshops and organizing committees. In addition, he is a peer reviewer for many international highimpact journals. He is also a senior member of the IEEE.