Chapter 2, Using Threat Intelligence Flashcards
Domain 0.1. Threat and Vuln management 1.1explain importance of threat data and intelligence 1.2 given a scenario, utilize threat intelligence to support org security Domain 3.0 Security ops and monitoring 3. explain importance of proactive threat hunting
Which type of threat intelligence provides a broad view about threats?
Strategic threat intelligence
What type of threat intelligence includes very detailed information allowing a response to a specific threat?
Operational threat Intelligence
What are the 3 factors to consider when assessing threat intelligence sources?
Is it timely?
Is it accurate?
Is it relevant?
what allows organizations to assess threat intelligence based on how much they trust they can give it?
Confidence scores.
What is STIX?
Structured Threat Information Expression. It’s an XML language designed to standardize cyber threat information in a machine readable format.
Which threat indicator language was developed by Mandiant and focusses on types of compromises?
Open Indicator of Compromise (OpenIOC)
What are the 5 stages of the Threat Intelligence Cycle?
1) REQUIREMENTS gathering
2) COLLECTION of threat data
3) ANALYSIS of threat data
4) DISSEMINATION of threat intelligence
5) Gathering FEEDBACK
What’s the main purpose of the Requirements gathering phase of the Threat Intelligence lifecycle?
It’s to assess what CTI and associated controls that could have prevented or limited security breaches* an organization may have had.
It also assess what information and controls could prevent breaches following a risk assessment, audit or industry trends.
What issues might you be faced with when you’re analysing threat data?
It might be in different formats or not formatted at all so you’d need to format the data so it can be consumed by whatever tools you’re using
Why do we get feedback as part of the Threat Intelligence lifecycle?
It’s done for continuous improvement of the process itself to improve it’s output.
Which group of American threat intelligence communities helps major infrastructure owners/operators share intelligence information?
ISACs - Information Sharing and Analysis Centres
What are the two main benefits of a threat classification tool?
1) provides a common way to describe threats which makes them easier to manage
2) serves as a reminder of the types of threats to give analysts better threat analysis
What protocol was designed to specifically exchange the cyber threat intelligence information in the STIX format?
TAXII
Which stage of the Intelligence Cycle would you format the data?
Threat Data Analysis stage
which concept around threat intelligence was introduced in 1998 as part of Presidential diretive-63?
ISACS