2. Cybersecurity Threat Landscape Flashcards

1
Q

Shadow IT

A

Where individuals and groups seek out their own technology solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Vectors

A

The means that threat actors use to obtain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IoC’s

A

Indicators of Compromise

Telltale signs that an attack has taken place. May include file signatures, log patterns, and other evidence left behind by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

STIX

A

Structured Threat Information Expression.

An XML language that defines a threat by 12 domain objects including: attack patterns, identities, malware, threat actors, and tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TAXII

A

Trusted Automatic Exchange of Indicator Information.

Intended to allow cyber threat information to be communicated at the application layer via HTTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OpenIOC

A

Open Indicators of Compromise.

Also an XML based framework. Typically includes metadata like the author, the name of the IOC, and a description of the indicator. May also include details of the actual compromise(s) that led to the indicator’s discovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISACs

A

Information Sharing and Analysis Centers.

Help infrastructure owners and owners share threat information and provide tools and assistance to their members.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TTPs

A

Tactics, Techniques, and Procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internet RFC’s

A

Internet Request for Comments.

Informative documents that contain technical specifications for internet protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly