The Cyber Intelligence Analyst’s Cookbook. Volume 1: A primer for Open Source Intelligence Collection and Applied Research
贝壳书屋

The Cyber Intelligence Analyst’s Cookbook. Volume 1: A primer for Open Source Intelligence Collection and Applied Research 电子书下载

admin A+ A- 该资源由用户: 千斤赞悦 上传  举报不良内容

书名:The Cyber Intelligence Analyst’s Cookbook. Volume 1: A primer for Open Source Intelligence Collection and Applied Research

The Cyber Intelligence Analyst’s Cookbook. Volume 1: A primer for Open Source Intelligence Collection and Applied Research.jpg

This book. Well, it started out as a manual, or rather a brain dump of my process. I`ve spent the last year or so examining how I collect Open Source Intelligence (OSINT) and tag it. Pretty simple right? Not so much. What I found over that year was that I continually added new tags to the artifacts, or I was creating new tags because they didn`t exist within the database I use for storing this information. I use the Malware Information Sharing Platform (MISP) exclusively for my work. MISP is open, expandable, and can be queried by other apps using several different methods. Most of all, it`s free. Anyways, I started with this brain dump of my process for recording OSINT. The work initially started out just for me. I haven`t documented any of my methods, thoughts, what have you in quite some time. I was due for this knowledge transfer. However, as I began writing, I found that a manual wasn`t going to cut it. The next thing I know, I`m writing a book, and thirty days- ish later, the first draft was completed. Truthfully, it`s an awful book, and I apologize to anyone who attempts to read it. Yet, as I look back over the body of knowledge, I see that I`ve at least created a good foundation for future volumes. Opportunities for expansion and clarification. Who knows, maybe someone will find what`s in this book useful. The book itself is explicitly written for cyber intelligence analysts. Still, anyone who performs intelligence as a discipline can deconstruct what`s here and apply it to any intelligence domain. I`m also assuming the reader, at a minimum, has access to the Internet and can look up the tools used within the book. I`ve tried my best to add references to the right level of detail and completeness. I do believe in citing sources. Well, I`ve been beaten into always citing sources through my academic career as a student. So, what exactly is in this book? Part 1 of this book goes over the way I collect and store OSINT into MISP. Part 2 goes over some higher-order analysis that can be applied to the data. I`ve placed the book under the GNU Free Documentation License. I`ve learned a lot from the open community and feel that this particular contribution belongs to the community. Those who take part in the open community, per se, made me. I`ve had to put a lot of work into myself to get to this point of knowledge in my own life, but I would not have gotten to this point if others hadn`t laid the foundation before me. I`m sure folks will argue with the premises and processes I`ve laid out in this book, and that`s totally cool with me. Hell, the one thing I know from my current Ph.D. program at university is to be prepared for the beating. This book is in no way a stone tablet or bible that must be adhered to as gospel truth.

尊敬的读者:
欢迎您访问我们的网站。本站的初衷是为大家提供一个共享学习资料、交换知识的平台。每位用户都可以将文件上传至网盘并分享。
然而,随着用户上传的资料增多,我们发现部分不宜或版权问题的书籍被分享到了本站。 为此,我们已经关闭了分享入口,并进行了多次书籍审查,但仍有部分内容未能彻底审查到位。
在此,我们恳请广大读者与我们共同监督,如发现任何不宜内容,请 点击此处 进行举报,我们会第一时间处理并下架相关内容。
希望我们能共建一个文明社区!感谢您的理解与支持!

直接下载

贝壳书屋 © All Rights Reserved.  
关于我们| 联系我们| 留言|