Summary/Abstract |
Managing these economic and national security hazards in cyberspace has been a vexing problem. 6 Most discourse about cybersecurity solutions has focused on defensive measures, mainly ways to protect the perimeter around sensitive data, information, and systems. Network and system administrators worry about reacting to network intrusions and compromises so that system downtime is minimized and usage can be continued with minimal interruption. While improving network security and information assurance technology may be necessary, these measures are not sufficient to counter the complex and evolving array of cyber threats. Because current reactive approaches are not working, fundamentally changing how to understand and operate in cyberspace is necessary. 7 A transformed approach to cybersecurity cannot rely solely on responding to known threats; it must also track the capabilities, intentions, and activities of potential adversaries and competitors, as they evolve, in the cyber realm. 8 That set of information and associated functions is referred to as Cyber Intelligence.
|