The Cyber Intelligence Analyst’s Cookbook. Volume 1: A primer for Open Source Intelligence Collection and Applied Research

该资源由用户: 千斤赞悦 上传  举报不良内容

This book. Well, it started out as a manual, or rather a brain dump of my process. I`ve spent the last year or so examining how I collect Open Source Intelligence (OSINT) and tag it. Pretty simple right? Not so much. What I found over that year was that I continually added new tags to the artifacts, or I was creating new tags because they didn`t exist within the database I use for storing this information. I use the Malware Information Sharing Platform (MISP) exclusively for my work. MISP is open, expandable, and can be queried by other apps using several different methods. Most of all, it`s free. Anyways, I started with this brain dump of my process for recording OSINT. The work initially started out just for me. I haven`t documented any of my methods, thoughts, what have you in quite some time. I was due for this knowledge transfer. However, as I began writing, I found that a manual wasn`t going to cut it. The next thing I know, I`m writing a book, and thirty days- ish later, the first draft was completed. Truthfully, it`s an awful book, and I apologize to anyone who attempts to read it. Yet, as I look back over the body of knowledge, I see that I`ve at least created a good foundation for future volumes. Opportunities for expansion and clarification. Who knows, maybe someone will find what`s in this book useful. The book itself is explicitly written for cyber intelligence analysts. Still, anyone who performs intelligence as a discipline can deconstruct what`s here and apply it to any intelligence domain. I`m also assuming the reader, at a minimum, has access to the Internet and can look up the tools used within the book. I`ve tried my best to add references to the right level of detail and completeness. I do believe in citing sources. Well, I`ve been beaten into always citing sources through my academic career as a student. So, what exactly is in this book? Part 1 of this book goes over the way I collect and store OSINT into MISP. Part 2 goes over some higher-order analysis that can be applied to the data. I`ve placed the book under the GNU Free Documentation License. I`ve learned a lot from the open community and feel that this particular contribution belongs to the community. Those who take part in the open community, per se, made me. I`ve had to put a lot of work into myself to get to this point of knowledge in my own life, but I would not have gotten to this point if others hadn`t laid the foundation before me. I`m sure folks will argue with the premises and processes I`ve laid out in this book, and that`s totally cool with me. Hell, the one thing I know from my current Ph.D. program at university is to be prepared for the beating. This book is in no way a stone tablet or bible that must be adhered to as gospel truth.

尊敬的读者:
欢迎您访问我们的网站。本站的初衷是为大家提供一个共享学习资料、交换知识的平台。每位用户都可以将文件上传至网盘并分享。
然而,随着用户上传的资料增多,我们发现部分不宜或版权问题的书籍被分享到了本站。
为此,我们已经关闭了分享入口,并进行了多次书籍审查,但仍有部分内容未能彻底审查到位。
在此,我们恳请广大读者与我们共同监督,如发现任何不宜内容,请 点击此处 进行举报,我们会第一时间处理并下架相关内容。
希望我们能共建一个文明社区!感谢您的理解与支持!

扫一扫即可关注本站(PDF之家)微信公众账号
发送您想要找的书籍名称即可找到书籍

Image

本站为非盈利性网站, 但服务器成本高昂, 如果本站内容对您有帮助, 欢迎捐赠, 您的鼓励是我们最大的动力!

大小: 4.6 MB
格式: PDF

声明

本站资源来源于网络及个人用户网盘上传,仅用于分享知识,学习和交流! 本站不保存,不制作,不出售任何图书。请您下载完在24小时内删除。 资源禁用于商业用途!如果您喜欢本站资源,请购买正版,谢谢合作!

标签

Intelligence Cyber Analyst Cookbook Volume primer Open Source Collection Applied

扫码支持一下:

Image Image

猜你喜欢

The Cyber Intelligence Analyst’s Cookbook. Volume 1: A primer for Open Source Intelligence Collection and Applied Research

请输入验证码: