Introduction to Cyber Threat Intelligence

Introduction to Cyber Threat Intelligence
Introduction to Cyber Threat Intelligence

Reading Expectation: Material was selected to provide the working knowledge for each module’s Case and SLP. It is expected that the student research, seek out knowledge, and solutions beyond the provided course material.
Required Videos

TED Talks. (2014, June 30) Chris Domas: The 1s and 0s behind cyber warfare

. Retrieved from

Center for Development of Security Excellence (CDSE). (2016, May 4). CDSE CI awareness

. Retrieved from
Required Reading

Averbuch A. and Siboni, G. (2013). The classic cyber defense methods have failed – what comes next? Military and Strategy Affairs, 5(1). Retrieved from

Barnum, S. (2014). Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIX™). The MITRE Corporation, 1.1(1), 1-22. Retrieved from

Jarvis, L., Macdonald, S., & Nouri, L. (2014). The cyberterrorism threat: Findings from a survey of researchers. Studies in Conflict & Terrorism, 37(1), 68-90. Retrieved from EBSCO Military & Government Collection. Available from Trident Online Library.

Jasiul, B., Szpyrka, M., & Liwa, J. (2014). Detection and modeling of cyber attacks with petri nets. Entropy, 16(12), 6602-6623. Retrieved from

Paletta, D. (2015, Feb 10). White House to create new division to streamline cyber threat intelligence; effort to buttress government, corporate defenses against sophisticated hackers. Wall Street Journal. Retrieved from Trident Library ProQuest

Sternstein, A. (2011). Corporate intelligence. Government Executive, 43(13), 16-18. Retrieved from Trident Library EBSCO Military & Government Collection

Timberg Craig Timberg, C. (2015, May 30). The real story of how the Internet became so vulnerable. Net of Insecurity. Retrieved from
Required Website

Department of Homeland Security (DHS). Critical Infrastructure Sectors. Retrieved from

Department of Homeland Security (DHS). National Infrastructure Protection Plan. Retrieved from

Surfwatch. Cyber Risk Intelligence.
Optional Reading

Bakjhi, S. (2013, May 6). 25 Biggest cyber-attacks in history. Retrieved from

DNI Clapper announces leadership of cyber threat intelligence integration center. (2016, January 07). ODNI News Release No. 1-16

With 2015 cybersecurity challenges in the rearview, 2016 presents new opportunities. (2015). Retrieved from
Privacy Policy | Contact

Case Assignment

Today, countless computer systems are linked to each other by the Internet, which was not designed to be secure but to be open and accessible. Accessibility comes with threats, risk to data, risk to infrastructure security, and risks to system’s controls. Threat awareness associated with Cyber Threat Intelligence is critical to protecting the critical infrastructure. The benefits from this technology are endless; unfortunately, those with hostile intent can exploit technology in a hostile manner.

For this Case, answer the following:

Define Cyber Threat Intelligence.
Explain the detailed link between the Internet and Cyber Threat Intelligence.
Based on your readings, discuss Cyber Threat Intelligence’s impact on the global and domestic communities.

Assignment Expectations

Assignments should be 3- to 5-pages, double-spaced, excluding the cover and reference pages. Paper format: (a) Cover page, (b) Header, and (c) Body. Submit your assignment by the last day of this module. Provide quotations to support your responses.

Relevance—All content is connected to the question.
Precision—Specific questions are addressed. Statements, facts, and statistics are specific and accurate.
Depth of discussion—Present and integrate points that lead to deeper issues.
Breadth—Multiple perspectives, references, and issues/factors are considered.
Evidence—Points are well-supported with facts, statistics, and references.
Logic—Presented discussion makes sense; conclusions are logically supported by premises, statements, or factual information.
Clarity—Writing is concise, understandable, and contains sufficient detail or examples.
Objectivity—Avoids use of first person and subjective bias.
References—Sources are listed at the end of the paper.

Use strong credible sources: peer-reviewed references, government documents, and subject matter expert materials to support your answer. Your paper will not exceed 5 pages (excluding cover sheet and reference page(s)).

find the cost of your paper