1 - 3: Threat Intelligence Flashcards
Threat Intelligence
Actions taken to educate about changes in cybersecurity, adapting security controls based on that knowledge
Open-source Intelligence
Uses public information, often using security websites, vulnerability databases, dark web sources, sharing centers, file or code repositories, or security researchers
Email address harvesting
Searches for valid addresses for social engineering attacks
Criteria for threat intelligence source
Timeliness, accuracy, reliability
Threat indicators
Data or other information that describes a threat, such as IP addresses or file signatures
CybOX (not questioned on exam)
Cyber Observable eXpression, a standardized schema for categorizing security observations, including intrusion attempts and malicious software
STIX
Structured Threat Information eXpression, a standardized language communicating security information between systems, using CybOX
TAXII
Trusted Automated eXachange of Indicator Information, provides a technical framework for exchanging messages and information written in the STIX language
OpenIOC
Mandiant Labs’s threat intelligence language, describes file names, sizes, and specific indicators
Functions threat intelligence supports
Incident response, vulnerability management, risk management, security engineering, detection and monitoring / SOCs
ISACs
Information Sharing and Analysis Centers, confidential sharing centers for threat intelligence based on industry
Threat research
Understanding adversaries’ methods, intent, etc
Threat research techniques
Reputational threat research and Behavioral threat research
Reputational threat research
Identifying potentially malicious actors based on previous behavior, IP addresses, email, domains
Behavioral threat research
Identifying potentially malicious actors based on the similarity of behaviors to past attackers