(4) Proactive and Focused Threat Hunting Flashcards

1
Q

What are the main steps to proactive threat hunting?

A

Establish a hypothesis

profiling threat actors and activities

Threat hunting tactics

Reducing the attack surface area

Bundling critical assets into groups and protection zones

Understanding, assessing, and addressing attack vectors or the means by which an attack can be conducted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

During proactive threat hunting, what does reducing the attack surface area do for the org?

A

Reducing the attack surface area allows resources to be focused on the remaining surface area, which makes protecting the org easier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

During the threat hunting process, what does bundling critical assets into groups and protection zones do for the org?

A

Bundling critical assets into groups and protection zones helps with managing the attack surface area, threat hunting, and response activities, since each asset doesn’t need to be assessed on its own or managed as specific item

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

During proactive threat hunting, what do we need to remember about understanding, assessing, and addressing attack vectors or the means by which an attack can be conducted?

A

We need to make sure that this process has to be based on analysis of threat actors and their techniques as well as the surface area that threat actors can focus on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

During proactive threat hunting, what is involved in the integrated intelligence step?

A

This process brings multiple intelligence sources together to give a more complete picture of threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

During the proactive threat hunting process, what is to be remembered about improving detection capabilities

A

Detection capabilities must be improved nonstop as new threats will beat old protective measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat hunting needs to be focused, what do we need to remember about configurations?

A

Configurations and misconfigurations can lead to compromise or it can appear as if an attacker has changed the settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When focusing threat hunting, what do we need to remember about isolated networks?

A

Threat hunting in isolated networks are easier because traffic should be understood, but they should be understood by having centrally managed tools and capabilities involved to protect and understand the traffic that goes through these networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When it comes to focused threat hunting, what needs to be remembered about business critical assets?

A

Business critical assets and processes are focused on because they are very important. Threat hunters focus on these because the organizational risk profile. It is important to make sure that business critical assets remain secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly