Muutke küpsiste eelistusi

Rand's Scalable Warning and Resilience Model (Swarm): Enhancing Defenders' Predictive Power in Cyberspace [Pehme köide]

  • Formaat: Paperback / softback, 114 pages, Illustrations, unspecified
  • Ilmumisaeg: 30-Jul-2021
  • Kirjastus: RAND
  • ISBN-10: 1977406777
  • ISBN-13: 9781977406774
  • Formaat: Paperback / softback, 114 pages, Illustrations, unspecified
  • Ilmumisaeg: 30-Jul-2021
  • Kirjastus: RAND
  • ISBN-10: 1977406777
  • ISBN-13: 9781977406774

The model introduced in this report is intended to enhance the predictive capabilities available to cyber defenders while also augmenting resilience by improving preventions and detections of cyber threats.

Preface iii
Figures and Tables
vii
Summary ix
Acknowledgments xiii
Abbreviations xv
Chapter One Introduction, Research Methodology, and Historical Evolution of Concepts
1(12)
Research Methodology and Report Organization
2(1)
History and Evolution of Indications and Warning Frameworks in the USIC
3(2)
Main Definitions of I&W Frameworks
5(3)
History and Evolution of the Concept of Resilience
8(5)
Chapter Two Indications and Warning Frameworks
13(6)
Chapter Three RAND's Scalable Warning and Resilience Model at a Glance
19(4)
Chapter Four Swarm Step One: Identify Relevant Cyber Adversaries
23(8)
Identify Organization Type to Be Protected
23(2)
Categorizing Cyber Threat Classes
25(2)
Identifying the Main Cyber Threat Classes Targeting an Organization
27(4)
Chapter Five Swarm Step Two: Focus All-Source Intelligence Collection
31(16)
Technical CTI Collection
32(5)
Nontechnical OSINT Collection and Analysis
37(10)
Chapter Six SWARM Step Three: Apply a Threat Model
47(10)
Chapter Seven SWARM Step Four: Adversary Emulation
57(6)
Chapter Eight Case Study: Applying SWARM to Predict Phishing Campaigns from the North Korea-Nexus Kimsuky Threat Actor
63(24)
Step One Applied---Identify Relevant Cyber Adversaries
63(2)
Step Two Applied---Focus All-Source Intelligence Collection
65(17)
Step Three Applied---Apply a Threat Model
82(1)
Step Four Applied---Adversary Emulation
83(4)
Chapter Nine Conclusion
87(2)
References 89