Query Result Set
SLIM21 Home
Advanced Search
My Info
Browse
Arrivals
Expected
Reference Items
Journal List
Proposals
Media List
Rules
ActiveUsers:1509
Hits:19682312
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
Help
Topics
Tutorial
Advanced search
Hide Options
Sort Order
Natural
Author / Creator, Title
Title
Item Type, Author / Creator, Title
Item Type, Title
Subject, Item Type, Author / Creator, Title
Item Type, Subject, Author / Creator, Title
Publication Date, Title
Items / Page
5
10
15
20
Modern View
CYBER INTELLIGENCE
(4)
answer(s).
Srl
Item
1
ID:
155384
Communicating cyber intelligence to non-technical customers
/ Nussbaum, Brian H
Nussbaum, Brian H
Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract
Cyber intelligence analysis is without doubt one of the fastest growing components of the intelligence enterprise.
Key Words
Cyber Intelligence
;
Non-Technical Customers
Links
'Full Text'
In Basket
Export
2
ID:
171058
Evaluating commercial cyber intelligence activity
/ Work, JD
Work, JD
Journal Article
0 Rating(s) & 0 Review(s)
Key Words
Cyber-attacks
;
Cyber Intelligence
;
Cyber-Attack
Links
'Full Text'
In Basket
Export
3
ID:
134898
Operational levels of cyber intelligence
/ Mattern, Troy; Felker, John; Borum, Randy; Bamford, George
Borum, Randy
Article
0 Rating(s) & 0 Review(s)
Summary/Abstract
Managing these economic and national security hazards in cyberspace has been a vexing problem. 6 Most discourse about cybersecurity solutions has focused on defensive measures, mainly ways to protect the perimeter around sensitive data, information, and systems. Network and system administrators worry about reacting to network intrusions and compromises so that system downtime is minimized and usage can be continued with minimal interruption. While improving network security and information assurance technology may be necessary, these measures are not sufficient to counter the complex and evolving array of cyber threats. Because current reactive approaches are not working, fundamentally changing how to understand and operate in cyberspace is necessary. 7 A transformed approach to cybersecurity cannot rely solely on responding to known threats; it must also track the capabilities, intentions, and activities of potential adversaries and competitors, as they evolve, in the cyber realm. 8 That set of information and associated functions is referred to as Cyber Intelligence.
Key Words
Cyber Security
;
Network Security
;
Cyber Attack
;
Cyber Vulnerability
;
Cyber Intelligence
;
Defensive Readiness Condition
Links
'Full Text'
In Basket
Export
4
ID:
171253
Using biotechnology to build a workforce for intelligence and counterintelligence
/ Guitton, Matthieu J
Guitton, Matthieu J
Journal Article
0 Rating(s) & 0 Review(s)
Key Words
Intelligence
;
Biotechnology
;
Workforce
;
Counterintelligence
;
Cyber Intelligence
;
Geopolitical Impact
;
Cyberpsychology
;
Cybersciences
Links
'Full Text'
In Basket
Export