{"id":14324,"date":"2024-03-03T07:51:06","date_gmt":"2024-03-03T07:51:06","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/information-sharing-cyber-threat-intelligence-the-u-s-government-professor-stacey-a-wright-cissp-swrightalbany-edu\/"},"modified":"2024-03-03T07:51:06","modified_gmt":"2024-03-03T07:51:06","slug":"information-sharing-cyber-threat-intelligence-the-u-s-government-professor-stacey-a-wright-cissp-swrightalbany-edu","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/information-sharing-cyber-threat-intelligence-the-u-s-government-professor-stacey-a-wright-cissp-swrightalbany-edu\/","title":{"rendered":"Information Sharing, Cyber Threat Intelligence, &#038; the U.S. Government Professor: Stacey A. Wright, CISSP swright@albany.edu"},"content":{"rendered":"<p><span style=\"cursor: auto; color: inherit;\"><\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 12pt; cursor: auto; color: inherit;\">On the first page:<\/span><\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 14pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Watch one of the following webinars. Summarize the webinar (at least 6 sentences) and briefly answer the following questions (at least 3 sentences each). Receive up to 20 points.<\/span><\/p>\n<ol style=\"cursor: auto; color: inherit;\">\n<li style=\"font-size: 12pt; cursor: auto; color: inherit;\" aria-level=\"1\">\n<p style=\"margin-top: 14pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Why did you choose this webinar?<\/span><\/p>\n<\/li>\n<li style=\"font-size: 12pt; cursor: auto; color: inherit;\" aria-level=\"1\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">What did you find most interesting during the webinar?<\/span><\/p>\n<\/li>\n<li style=\"font-size: 12pt; cursor: auto; color: inherit;\" aria-level=\"1\">\n<p style=\"margin-top: 0pt; margin-bottom: 14pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">What surprised you the most?<\/span><\/p>\n<\/li>\n<\/ol>\n<p style=\"margin-top: 14pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 12pt; cursor: auto; color: inherit;\">&#8220;2022 ICS\/OT Cybersecurity Threat Landscape.&#8221; Dragos. <\/span><a style=\"cursor: auto;\"><span style=\"font-weight: 700; font-size: 12pt; cursor: auto; color: inherit;\">https:\/\/hub.dragos.com\/on-demand\/2022-ics-cyber-threat-landscape<\/span><\/a><\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 14pt; padding: 14pt 0pt 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 12pt; cursor: auto; color: inherit;\">On the second page:&nbsp;<\/span><\/p>\n<ul style=\"cursor: auto; color: inherit;\">\n<li style=\"font-size: 12pt; cursor: auto; color: inherit;\" aria-level=\"1\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Slide 7 discusses the different types of intelligence. Pick a large cyber incident and provide examples (~2-2 sentences) of each type of intelligence about that incident. (You don&#8217;t need to provide actual IOCs, etc. just an example of what would constitute event intelligence, etc.<\/span><\/p>\n<\/li>\n<ul style=\"cursor: auto; color: inherit;\">\n<li style=\"font-size: 12pt; cursor: auto; color: inherit;\" aria-level=\"2\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Types of intelligence<\/span><\/p>\n<\/li>\n<ul style=\"cursor: auto; color: inherit;\">\n<li style=\"font-size: 11pt; cursor: auto; color: inherit;\" aria-level=\"3\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Event Intelligence\u2013about an event<\/span><\/p>\n<\/li>\n<li style=\"font-size: 11pt; cursor: auto; color: inherit;\" aria-level=\"3\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Threat Intelligence\u2013about a threat<\/span><\/p>\n<\/li>\n<li style=\"font-size: 11pt; cursor: auto; color: inherit;\" aria-level=\"3\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Tactical Intelligence\u2013assesses real-time events, investigations, and other activities to provide day-to-day operational support, such as the development of signatures and Indicators of Compromise (IOCs)<\/span><\/p>\n<\/li>\n<li style=\"font-size: 11pt; cursor: auto; color: inherit;\" aria-level=\"3\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Operational Intelligence\u2013assesses specific, potential incidents, events, investigations and\/or activities and provides insights that can guide and support response operations<\/span><\/p>\n<\/li>\n<li style=\"font-size: 11pt; cursor: auto; color: inherit;\" aria-level=\"3\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Strategic Intelligence\u2013assesses disparate bits of information to form integrated views for the purpose of informing decision and policy makers on broad or long-term issues and\/or providing timely warning of threats<\/span><\/p>\n<\/li>\n<\/ul>\n<\/ul>\n<\/ul>\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\"><\/p>\n<ul style=\"cursor: auto; color: inherit;\">\n<li style=\"font-size: 12pt; cursor: auto; color: inherit;\" aria-level=\"1\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">I describe the 8 reasons you wouldn&#8217;t share it. Pick 4 of the reasons and explain, in 1-2 sentences why that reasons not to share is important.<\/span><\/p>\n<\/li>\n<ul style=\"cursor: auto; color: inherit;\">\n<li style=\"font-size: 12pt; cursor: auto; color: inherit;\" aria-level=\"2\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Reasons you wouldn\u2019t share it:<\/span><\/p>\n<\/li>\n<ul style=\"cursor: auto; color: inherit;\">\n<li style=\"font-size: 12pt; cursor: auto; color: inherit;\" aria-level=\"3\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Limited by law (lawyers)\/ regulations \/ classification or dissemination markings<\/span><\/p>\n<\/li>\n<li style=\"font-size: 12pt; cursor: auto; color: inherit;\" aria-level=\"3\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Cyber insurance rules prevent it<\/span><\/p>\n<\/li>\n<li style=\"font-size: 12pt; cursor: auto; color: inherit;\" aria-level=\"3\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Open yourself up to more vulnerabilities<\/span><\/p>\n<\/li>\n<li style=\"font-size: 12pt; cursor: auto; color: inherit;\" aria-level=\"3\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Hurt company financials (e.g., stock prices)<\/span><\/p>\n<\/li>\n<li style=\"font-size: 12pt; cursor: auto; color: inherit;\" aria-level=\"3\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Less valuable\u2013crying wolf, quantity over quality (info not intel)<\/span><\/p>\n<\/li>\n<li style=\"font-size: 12pt; cursor: auto; color: inherit;\" aria-level=\"3\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Intel shared into the wrong hands<\/span><\/p>\n<\/li>\n<li style=\"font-size: 12pt; cursor: auto; color: inherit;\" aria-level=\"3\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">0day \u2013too quickly and you tell bad guys about the vulnerabilities before the good guys can fix them, thereby hurting friends<\/span><\/p>\n<\/li>\n<li style=\"font-size: 12pt; cursor: auto; color: inherit;\" aria-level=\"3\">\n<p style=\"margin-top: 0pt; margin-bottom: 0pt; line-height: 1.38; cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Pendulum swing\u2013 180* turn based on limited info<\/span><\/p>\n<\/li>\n<\/ul>\n<\/ul>\n<\/ul>\n<p><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On the first page: Watch one of the following webinars. Summarize the webinar (at least 6 sentences) and briefly answer the following questions (at least 3 sentences each). Receive up to 20 points. Why did you choose this webinar? What did you find most interesting during the webinar? What surprised you the most? &#8220;2022 ICS\/OT [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/14324"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=14324"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/14324\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=14324"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=14324"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=14324"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=14324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}