CISSP Flashcards
Cyber threat intelligence
Cyber threat intelligence is the collection and analysis of threat trends to identify potential or actual threats to the organization. As a result, organizations will be better prepared to create preventative and
detective cybersecurity measures
Passive footprinting
Passive footprinting collects information about the target
without directly interacting with it. This typically involves combing through the target’s website, job sites, forums, among other sites
Active footprinting
Active footprinting
collects information about the target through direct interaction, such as e-mailing, calling, and visiting the target’s physical location
Open-source intelligence
Publicly available information
Proprietary/closed-source intelligence
Info with restricted access (e.g. police record)
Timeliness Intelligence
timely receipt/operationalization (impact > intelligence cost)
Accuracy Intelligence
Must save organizations more in success than errors/mistakes
Relevancy intelligence
Must address a threat and allow for effective action; usable delivery format
OpenIOC
OpenIOC is an open cyber threat sharing framework designed for exchanging threat data with other parties in a machine-readable standard format for defining/recording/sharing artifacts. Businesses use OpenIOC to share IOCs with other businesses that serve the threat intelligence communities worldwide
STIX
Structured Threat Information eXpression (STIX). Describes cyber threat information (motivation, abilities, capabilities, response)
TAXII
Trusted Automated eXchange of Indicator Information (TAXII), describes how threat info (STIX) can be shared (hub-and-spoke; source/subscriber; peer-to-peer); discovery, collection management, inbox, poll
Known Threats vs. Unknown Threats
Known Threats This is our low-hanging fruit, like spam and viruses, which have been seen
before. It can be found through open-source intelligence (OSINT)
Unknown Threats is considered a malicious code that has not been seen before
Zero-day
Zero-day is unknown vulnerabilities or malware that have no patches
APT
Advanced persistent threats (APTs) are skilled attackers supported by extremely large resources such as military or government-sponsored
Nation-state (Threat actors)
Nation-state threat actors are frequently among the most sophisticated adversaries, with dedicated infrastructure, training resources, and operational support behind their activities. Their activities are characterized by extensive planning and coordination and often reflect the strong government or military influence behind them