Item Details
Skip Navigation Links
   ActiveUsers:1116Hits:19665153Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

In Basket
  Article   Article
 

ID134898
Title ProperOperational levels of cyber intelligence
LanguageENG
AuthorBorum, Randy ;  Mattern, Troy ;  Felker, John ;  Bamford, George
Summary / Abstract (Note)Managing these economic and national security hazards in cyberspace has been a vexing problem. 6 Most discourse about cybersecurity solutions has focused on defensive measures, mainly ways to protect the perimeter around sensitive data, information, and systems. Network and system administrators worry about reacting to network intrusions and compromises so that system downtime is minimized and usage can be continued with minimal interruption. While improving network security and information assurance technology may be necessary, these measures are not sufficient to counter the complex and evolving array of cyber threats. Because current reactive approaches are not working, fundamentally changing how to understand and operate in cyberspace is necessary. 7 A transformed approach to cybersecurity cannot rely solely on responding to known threats; it must also track the capabilities, intentions, and activities of potential adversaries and competitors, as they evolve, in the cyber realm. 8 That set of information and associated functions is referred to as Cyber Intelligence.
`In' analytical NoteInternational Journal of Intelligence and Counter Intelligence Vol.27, No.4; winter 2014-15: p.702-719
Journal SourceInternational Journal of Intelligence and Counter Intelligence Vol: 27 No 4
Key WordsCyber Security ;  Network Security ;  Cyber Attack ;  Cyber Vulnerability ;  Cyber Intelligence ;  Defensive Readiness Condition


 
 
Media / Other Links  Full Text