2. Cybersecurity Threat Landscape Flashcards
Shadow IT
Where individuals and groups seek out their own technology solutions.
Threat Vectors
The means that threat actors use to obtain access.
IoC’s
Indicators of Compromise
Telltale signs that an attack has taken place. May include file signatures, log patterns, and other evidence left behind by attackers.
STIX
Structured Threat Information Expression.
An XML language that defines a threat by 12 domain objects including: attack patterns, identities, malware, threat actors, and tools.
TAXII
Trusted Automatic Exchange of Indicator Information.
Intended to allow cyber threat information to be communicated at the application layer via HTTPS.
OpenIOC
Open Indicators of Compromise.
Also an XML based framework. Typically includes metadata like the author, the name of the IOC, and a description of the indicator. May also include details of the actual compromise(s) that led to the indicator’s discovery.
ISACs
Information Sharing and Analysis Centers.
Help infrastructure owners and owners share threat information and provide tools and assistance to their members.
TTPs
Tactics, Techniques, and Procedures.
Internet RFC’s
Internet Request for Comments.
Informative documents that contain technical specifications for internet protocols.