WM090-15 Cyber Intelligence and Operations
Introductory description
Routine operations management should maintain a cyber system within its operational envelope and in an optimal state to do useful work; life-cycle operations such as patches, upgrades, replacements and training are performed in a planned and orderly fashion as part of routine operations management.
With indefinite resource, that would be sufficient; the preparedness of the cyber system would always be sufficient to deal with any threat or hazard to which it is exposed. With limited resource however, it is probable that the cyber system will be exposed to some specific threat or hazard that it is not sufficiently prepared to deal with. When this happens, an incident occurs which takes the cyber system outside its intended operational envelope.
The prioritisation and timely coordination of activities is critical to minimise the harm that follows from an incident. These activities should progressively restore the cyber system, re-mediate harm, prevent recurrence, inform interested parties, and restore confidence. Having a well rehearsed incident response plan helps to do this right.
In the cyber context, situational awareness presents the human decision maker with an intuitive representation of the well-being of their cyber environment. Critically, when things go wrong, the important symptoms of this wrongness are highlighted, facilitating corrective action.
Cyber intelligence provides an organisation with the ability to assess the cyber-related threats and hazards that may damage them. It is particularly concerned with the purposeful collection of information, its processing and analysis in order to produce actionable intelligence.
This module gives students a framework to reason about cyber security in order both to anticipate incidents, and to deal with their occurrence.
Module aims
To give students the ability to reason about the confidence that might be placed in indicators of its cyber well-being.
Outline syllabus
This is an indicative module outline only to give an indication of the sort of topics that may be covered. Actual sessions held may differ.
Cyber Intelligence
- Risk in the cyber context – assessment, management, hazard vs threat
- Threat actors – organisation, motivation, attention and deception
- Narratives, language and communication
- The intelligence cycle and current intelligence theory and practice, toolsets
Situational Awareness
- data collection, sensors, endpoint and channel hardening,
- prioritisation, timeliness, presentation, normal vs abnormal, information overload,
Incident response
- The incident response lifecycle
- Roles and structures
- Facilities, equipment, tools and techniques
- Internal and external communication pre-, mid- and post-incident
Learning outcomes
By the end of the module, students should be able to:
- Reason about the threats and hazards to which a cyber system may be exposed.
- Evaluate the situational awareness of an organisation.
- Reason about the production of actionable intelligence.
- Synthesise key indicators of cyber well-being.
Indicative reading list
Roberts S, Brown R; Intelligence-Driven Incident Response; O'Reilly (2016)
Cabinet Office: National Risk Register of Civil Emergencies; UK Cabinet Office (2013); [available at https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/211867/NationalRiskRegister2013_amended.pdf]
C. Avgerou, C. Ciborra and F. Land (eds) The Social Study of Information and Communication Technology : Innovation, Actors and Contexts, Oxford University Press, Oxford. 2004
C. Ciborra Digital Technologies and the Duality of Risk, CARR, LSE, 2004
M Glenny; DarkMarket: How Hackers Became the New Mafia; Vintage (2012)
UK MoD; Global Strategic Trends Out To 2045; UK MoD; (2015)
B Schneier; Liar and Outliers: Enabling the Trust that Society Needs to Thrive; Wiley (2012)
Subject specific skills
Developing cyber meaning from cyber fragments.
Transferable skills
Information literacy, ethical values, organisational awareness, communication
Study time
Type | Required |
---|---|
Lectures | 18 sessions of 1 hour (12%) |
Seminars | 10 sessions of 1 hour (7%) |
Practical classes | 12 sessions of 1 hour (8%) |
Assessment | 110 hours (73%) |
Total | 150 hours |
Private study description
No private study requirements defined for this module.
Costs
No further costs have been identified for this module.
You do not need to pass all assessment components to pass the module.
Assessment group A1
Weighting | Study time | Eligible for self-certification | |
---|---|---|---|
Coursework | 100% | 110 hours | Yes (extension) |
Typically, the submission will be some form of documentary artefact, constrained to address a scenario. |
Assessment group R
Weighting | Study time | Eligible for self-certification | |
---|---|---|---|
Assessed work as specified by department | 100% | Yes (extension) | |
100% Assignment |
Feedback on assessment
Written feedback provided with the mark via tabula.
Anti-requisite modules
If you take this module, you cannot also take:
- WM090-10 Cyber Intelligence and Operations
Courses
This module is Core optional for:
- Year 1 of TWMA-H6C7 Postgraduate Taught Cyber Security Engineering