Cyber Defense Magazine – July 2019

(Sean Pound) #1

Also, there would be still the open question if the IT security monitoring would be the appropriate way of
data gathering and intelligence production. In essence, the cybersecurity monitoring could be everything
starting from the signal listening until the decryption of so skillfully protected streams and it’s so vitally
important to get you need a lot of hard work in order to deal with the cybersecurity analytics, so far.
Moreover, the cybersecurity analytics got so important role in preparing the intelligence and their
reportings, so what we need to know is that such a task got its purposes in coping with the best practice
protection measures. Sometimes the monitored message could get encrypted and the process of
decryption and even cryptanalysis is not always that straightforward. On the other hand, in so many
cases; we could need the skillful cryptanalyst to transform the ciphertext into the plaintext. In conclusion,
the point is not every process of cryptanalysis could be automated or tool-based one, so sometimes we
need to rely on the manual efforts of reading the messages, so far.


The need for cybersecurity analytics


So, there would be some concerns if we would always be in position to deal with the cybersecurity
analytics tools and software that would give us the option to easily follow with is going on with the
observed signal or transmitted message. In the practice, there are a plenty of tools being available on
the marketplace that could serve for processing the findings being collected in some cyber defense
operation or campaign. That would mean it’s not always necessary to cope with some kind of
mathematical skill in order to analyze the information, but you would rather need to get the skillful user of
some data monitoring tool. Apparently, the good cybersecurity analysts should get familiar with the
mathematics basics at least and in so many cases, they should get the outstanding understanding of
such an area. On the other hand, the ultimate need of the cybersecurity analytics is to help us dealing
with the facts, not the assumptions only. Why does this matter? Practically, if we cope with such a
tendency, we can make our understanding of the incidents in the cyberspace getting more rational and
accurate. As it’s well-known, the accuracy is the big deal in any industry and if we apply the smart
cybersecurity analytics – we can count on so pragmatic outcomes. Further, so many security systems
and cases are the intelligence-led ones and it’s quite clear why we need the high level of accuracy in
producing the intelligence for those purposes.


The cyber defense analytics reportings


It may appear that the huge challenge in the cyber defense analytics is so accurate reporting which role
is to figure out what got important and what is not from such significance in the cyber terms. The accuracy
in the science and technology is so important and no technical systems could work well if they are not
accurately designed and developed. The similar situation is with the cyber defense solutions that must
deal with the certain level of accuracy. On the other hand, the reportings should get smartly prepared
and they would usually deal with some kind of template or the writing form that would suggest us what to
put an eye on. Also, the reportings would require so dedicated and precise work and every single piece
of information should get explained in details and using so knowledgeable approach.


How to produce cyber intelligence?


Next, the cyber intelligence would play the crucial role in dealing with some analytic, synthetic and
predictive models in the industry. By those models, we would mean any kind of the IT-based system that
would get capable to process the large amount of data, information and findings, so far. Basically, the
intelligence production would usually mean that we would rely on the information getting put under some

Free download pdf