Introduction to Cyber Threat Intelligence

Introduction to Cyber Threat Intelligence
Introduction to Cyber Threat Intelligence

Reading Expectation: Material was selected to provide the working knowledge for each module’s Case and SLP. It is expected that the student research, seek out knowledge, and solutions beyond the provided course material.
Required Videos

TED Talks. (2014, June 30) Chris Domas: The 1s and 0s behind cyber warfare

. Retrieved from

Center for Development of Security Excellence (CDSE). (2016, May 4). CDSE CI awareness

. Retrieved from
Required Reading

Averbuch A. and Siboni, G. (2013). The classic cyber defense methods have failed – what comes next? Military and Strategy Affairs, 5(1). Retrieved from

Barnum, S. (2014). Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIX™). The MITRE Corporation, 1.1(1), 1-22. Retrieved from

Jarvis, L., Macdonald, S., & Nouri, L. (2014). The cyberterrorism threat: Findings from a survey of researchers. Studies in Conflict & Terrorism, 37(1), 68-90. Retrieved from EBSCO Military & Government Collection. Available from Trident Online Library.

Jasiul, B., Szpyrka, M., & Liwa, J. (2014). Detection and modeling of cyber attacks with petri nets. Entropy, 16(12), 6602-6623. Retrieved from

Paletta, D. (2015, Feb 10). White House to create new division to streamline cyber threat intelligence; effort to buttress government, corporate defenses against sophisticated hackers. Wall Street Journal. Retrieved from Trident Library ProQuest

Sternstein, A. (2011). Corporate intelligence. Government Executive, 43(13), 16-18. Retrieved from Trident Library EBSCO Military & Government Collection

Timberg Craig Timberg, C. (2015, May 30). The real story of how the Internet became so vulnerable. Net of Insecurity. Retrieved from
Required Website

Department of Homeland Security (DHS). Critical Infrastructure Sectors. Retrieved from

Department of Homeland Security (DHS). National Infrastructure Protection Plan. Retrieved from

Surfwatch. Cyber Risk Intelligence.
Optional Reading

Bakjhi, S. (2013, May 6). 25 Biggest cyber-attacks in history. Retrieved from

DNI Clapper announces leadership of cyber threat intelligence integration center. (2016, January 07). ODNI News Release No. 1-16

With 2015 cybersecurity challenges in the rearview, 2016 presents new opportunities. (2015). Retrieved from
Introduction to Cyber Threat Intelligence

We are witnessing a real world cyber intelligence problem. We have the ability to view in real-time global cyber attacks. The Norse organization is exploiting Internet technology to supply live, accurate, and unique cyber-attack intelligence. Blocking cyber-attacks exposes cyber breaches and tracks cyber-threats around the globe. There was a time you could simply unplug the computer and the threat was eliminated. Today, computers are wireless. This technology is in our toys, phones, and our automobiles, which introduce cyber vulnerabilities and delivers a global, real world intelligence problem.

For this SLP, answer the following:

Relate cyber threats to a real world intelligence problem.
Describe a noteworthy Cyber Threat Intelligence breach, from 2015 and 2016, that has influenced the public and private sectors.

SLP Assignment Expectations

Assignments should be 3- to 5-pages, double-spaced, excluding the cover and reference pages. Paper format: (a) Cover page, (b) Header, and (c) Body. Submit your assignment by the last day of this module. Provide quotations to support your responses.

Relevance—All content is connected to the question.
Precision—Specific questions are addressed. Statements, facts, and statistics are specific and accurate.
Depth of discussion—Present and integrate points that lead to deeper issues.
Breadth—Multiple perspectives, references, and issues/factors are considered.
Evidence—Points are well-supported with facts, statistics, and references.
Logic—Presented discussion makes sense; conclusions are logically supported by premises, statements, or factual information.
Clarity—Writing is concise, understandable, and contains sufficient detail or examples.
Objectivity—Avoids use of first person and subjective bias.
References—Sources are listed at the end of the paper.

Use strong credible sources: peer-reviewed references, government documents, and subject matter expert materials to support your answer. Your paper will not exceed 5 pages (excluding cover sheet and reference page(s)).

find the cost of your paper