.08 RG Vocab threats & threat actors Flashcards
Threat Modeling
A form of risk assessment that simulates aspects of the attack and
defense sides of a logical entity, such as a piece of data, an application, a host, a system,
network, or an environment
Tactics, Techniques, and Procedures (TTPs)
A method that threat actors or groups use
when they want to compromise a target
Tactics
Represent the why of a technique and describes what an adversary is trying to
accomplish
Techniques
Represent how the threat actor achieves a tactical objective
Procedures
The detailed steps or how the technique is applied to execute the attack
Indicators of Attack (IoAs)
Contextual-based attributes of suspicious activity that may lead
to a security breach/attack
Indicators of Compromise (IoCs)
System artifacts or observables associated with an attack
Threat Modeling
Threats are always present when operating a business, software, system, or network.
Understanding threats and how they impact business functions and security posture is
essential for delivering value and services. One means of understanding these threats is a
form of risk assessment known as threat modeling.
Threat modeling is defined by NIST (n.d.) as a form of risk assessment that simulates aspects
of the attack and defense sides of a logical entity, such as a piece of data, an application, a
host, a system, a network, or an environment. Think of threat modeling as using an attacker’s
lens to uncover design flaws in the entity (software, network, environment, tool, etc.) you are
modeling.
Threat modeling provides a structured process for identifying security requirements,
quantifying threat vulnerability criticality, selecting and prioritizing remediation efforts, and
validating the success of such efforts.
When performing threat modeling, four primary questions are asked:
Diagram
What are you building? How does your environment look?
Identify threats
What could be exploited in your environment or software?
Mitigate
How do you defend identified threats?
Validate
Have you performed each step above? And were you successful
Threat modeling produces the following artifacts
● Abstraction of the system (description of the subject to be modeled)
● Profiles of potential attackers, including goals and methods (TTPs)
● Potential threats to the system
● Actions that can be taken to mitigate each threat
● A catalog of future threats (assumptions for the changing threat landscape)
Threat modeling has several advantages for a security professional. These include the
opportunity to make cybersecurity spending and control decisions based on data, gain
enhanced visibility into systems and environments, and inform the overall organization’s
defensive strategy.
Harden
includes application, credential, platform, and message hardening (recall from
modules 2 and 3 of this course that security hardening entails measures taken to
reduce the vulnerability of a system).
Detect is the analysis stage. It has the following subcategories
o File analysis
o Identifier analysis
o Message analysis
o Network traffic analysis
o Platform analysis
o Process analysis
o User behavior analysis