Chapter 2, Using Threat Intelligence Flashcards

Domain 0.1. Threat and Vuln management 1.1explain importance of threat data and intelligence 1.2 given a scenario, utilize threat intelligence to support org security Domain 3.0 Security ops and monitoring 3. explain importance of proactive threat hunting

1
Q

Which type of threat intelligence provides a broad view about threats?

A

Strategic threat intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of threat intelligence includes very detailed information allowing a response to a specific threat?

A

Operational threat Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 factors to consider when assessing threat intelligence sources?

A

Is it timely?
Is it accurate?
Is it relevant?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what allows organizations to assess threat intelligence based on how much they trust they can give it?

A

Confidence scores.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is STIX?

A

Structured Threat Information Expression. It’s an XML language designed to standardize cyber threat information in a machine readable format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which threat indicator language was developed by Mandiant and focusses on types of compromises?

A

Open Indicator of Compromise (OpenIOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 5 stages of the Threat Intelligence Cycle?

A

1) REQUIREMENTS gathering
2) COLLECTION of threat data
3) ANALYSIS of threat data
4) DISSEMINATION of threat intelligence
5) Gathering FEEDBACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s the main purpose of the Requirements gathering phase of the Threat Intelligence lifecycle?

A

It’s to assess what CTI and associated controls that could have prevented or limited security breaches* an organization may have had.
It also assess what information and controls could prevent breaches following a risk assessment, audit or industry trends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What issues might you be faced with when you’re analysing threat data?

A

It might be in different formats or not formatted at all so you’d need to format the data so it can be consumed by whatever tools you’re using

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why do we get feedback as part of the Threat Intelligence lifecycle?

A

It’s done for continuous improvement of the process itself to improve it’s output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which group of American threat intelligence communities helps major infrastructure owners/operators share intelligence information?

A

ISACs - Information Sharing and Analysis Centres

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two main benefits of a threat classification tool?

A

1) provides a common way to describe threats which makes them easier to manage
2) serves as a reminder of the types of threats to give analysts better threat analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What protocol was designed to specifically exchange the cyber threat intelligence information in the STIX format?

A

TAXII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which stage of the Intelligence Cycle would you format the data?

A

Threat Data Analysis stage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

which concept around threat intelligence was introduced in 1998 as part of Presidential diretive-63?

A

ISACS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are threat (classification) models used for? When

A

Threat classification models help assess organization risk.

17
Q

______ frameworks compliment threat modelling frameworks but focus on the specific t____ t____ and p_____ from an _____-centric perspective

A

attack
tactics, techniques and procedures
attacker

18
Q

Which threat models are typically used early in the in the development cycle to identify issues and get them fixed? Give an example of one.

A

asset-centric / software-centric

Microsoft’s STRIDE

19
Q

When did MITRE add cloud-focused techniques?

A

October 2019

20
Q

Apart from the ATT&CK model which others are there?

A

The Diamond Model of Intrusion Analysis

Lockheed Martin’s Cyber Kill Chain

21
Q

Core features, meta-features and confidence value are terms used in which attack model?

A

the Diamond Model of Intrusion Analysis

22
Q

Adversary, Structure, Capability, Victim are elements of which attack model?

A

the Diamond Model of Intrusion Analysis

23
Q

What are the first 4 stages in Lockheed Martin’s cyber kill chain

A
  1. Reconnaissance
  2. Weaponization
  3. Delivery
24
Q

What are stages 4-6 in Lockheed Martin’s cyber kill chain?

A
  1. Exploitation
  2. Installation
  3. Command and Control
25
Q

What is the last stage in Lockheed Martin’s cyber kill chain?

A
  1. Actions on Objectives
26
Q

What scoring system helps to grade vulnerabilities?

A

Common Vulnerabilities Scoring System (CVSS)

27
Q

What tools helps organizations assess and describe threats, threat actors and their techniques for the purpose of building appropriate defences.

A

Attack Frameworks

28
Q

What’s the name of the UK’s organization that shares threat intelligence with industry, govt and academia?

A

Centre for Protection of National Infrastructure

29
Q

What protocol was designed to specifically exchange the cyber threat intelligence information in the STIX format?

A

TAXII

30
Q

Which stage of the Intelligence Cycle would you format the data?

A

Threat Data Analysis stage

31
Q

which concept around threat intelligence was introduced in 1998 as part of Presidential diretive-63?

A

ISACS

32
Q

____ frameworks are used alongside t_____ m______ methodologies as part of threat modelling

A

threat modelling methodologies (e.g. STRIDE and PASTA)

33
Q

Which threat models are typically used early in the in the development cycle to identify issues and get them fixed?

A

asset-centric / software-centric

34
Q

Which threat model gives an attacker-centric perspective but provides an asset-centric output?

A

PASTA