ID | 134898 |
Title Proper | Operational levels of cyber intelligence |
Language | ENG |
Author | Borum, Randy ; Mattern, Troy ; Felker, John ; Bamford, George |
Summary / Abstract (Note) | Managing these economic and national security hazards in cyberspace has been a vexing problem. 6 Most discourse about cybersecurity solutions has focused on defensive measures, mainly ways to protect the perimeter around sensitive data, information, and systems. Network and system administrators worry about reacting to network intrusions and compromises so that system downtime is minimized and usage can be continued with minimal interruption. While improving network security and information assurance technology may be necessary, these measures are not sufficient to counter the complex and evolving array of cyber threats. Because current reactive approaches are not working, fundamentally changing how to understand and operate in cyberspace is necessary. 7 A transformed approach to cybersecurity cannot rely solely on responding to known threats; it must also track the capabilities, intentions, and activities of potential adversaries and competitors, as they evolve, in the cyber realm. 8 That set of information and associated functions is referred to as Cyber Intelligence.
|
`In' analytical Note | International Journal of Intelligence and Counter Intelligence Vol.27, No.4; winter 2014-15: p.702-719 |
Journal Source | International Journal of Intelligence and Counter Intelligence Vol: 27 No 4 |
Key Words | Cyber Security ; Network Security ; Cyber Attack ; Cyber Vulnerability ; Cyber Intelligence ; Defensive Readiness Condition |