Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In today's contested cyber environment, cyber intelligence gathering and analysis play a crucial role in informing and developing an organizations' cybersecurity posture. There are various

In today's contested cyber environment, cyber intelligence gathering and analysis play a crucial role in informing and developing an organizations' cybersecurity posture. There are various techniques that can be used to gather intelligence and they offer various information.

As discussed in the lesson, Open Source Intelligence (OSINT) and Social Media Intelligence (SOCMINT) are common techniques used in cyber intelligence. OSINT involves collecting information from publicly available sources, while SOCMINT focuses on extracting insights from social media platforms. These techniques help organizations in understanding potential threats, identifying vulnerabilities, and monitoring the activities of malicious actors.

However, relying solely on OSINT and SOCMINT may limit the scope of intelligence gathering. Other valuable intelligence sources include Human Intelligence (HUMINT), which uses espionage to gain information . This method of intelligence provides insights into the motivations and intentions of adversaries. The downside to HUMINT is it requires highly trained individuals to be intentionally placed to gather information without being detected.

Another method is Signal Intelligence (SIGINT), which includes disrupting electronic communications . This would include things like radio, email, and phone lines. The downside is that organizations have to know which of the adversary's lines or sources of communication is significant and interrupt it without the adversary noticing.SIGINT would provide helpful information regarding things like resource allocation and location. Like SOCMINT it requires analysts to go through large amounts of data to gather helpful information.

By using these methods of intelligence gathering, organizations can stay informed about various adversaries and threats along with information about their methods and possible targets. They are then able to use the information to guide their cyber security efforts and mitigate vulnerabilities. By combining diverse intelligence sources, organizations can derive a better picture of their operating environment and those operating within it.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Contemporary Management

Authors: Gareth Jones, Jennifer George

9th Edition

0077718372, 978-0077718374

More Books

Students also viewed these Algorithms questions

Question

What is the general form of a ???? statistic?

Answered: 1 week ago

Question

Please answer the question in the screenshot below:

Answered: 1 week ago