CySA+ 1 Study Notes Flashcards
1) Notify vendor of vulnerability
2) Provide vendor reasonable time to create patch
3) Disclose vulnerability publicly
Process when discovering new vulnerabilties :
1) Develop list of threats
2) Assess threats based on likelihood
3) Assess threats based on impact
4) Create Threat register
Threat Analysis :
set of activities an org. takes to educate itself about changes in cybersecurity threat landscape and adapt security controls based on that info.
security websites, news media, social media, govt. sponsored security analysis centers, security researchers, etc …
Threat Intelligence / Open-Source intelligence
search web for valid email addresses at targets domain and use those addresses to send out phishing attacks …
Email Harvesting
??? how promptly is threat intelligence delivered?
??? is data correct?
??? is the provider consistent ?
Timeliness / Accuracy / Reliability
(1) Requirements : determines needed info.
(2) Collection : gathers info meetings requirements.
(3) Analysis : Creates intelligence from info.
(4) Dissemination : shares analyzed intelligence.
(5) Feedback : identifies improvements.
Intelligence Cycle
??? standard language used to communicate security info between systems and org.’s.
??? set of services that share security info between systems and org.’s, provides technical framework for providing messages written in STIX language.
??? describes and shares security threat info.
STIX / TAXII / OpenIOC
bring together cybersecurity teams from competing org.’s to help share industry info in a confidential way.
ISAC
??? identify potentially malicious actors based on their use of IP address, email address, domains, etc that were previously used in attacks.
??? identify potentially malicious actors based upon similarity of their behaviors to past attackers.
Reputational Threat Research / Behavioral Threat Research
??? use asset inventory as basis for analysis.
??? identify how specific threats may affect each info system.
??? identify impact of various threats on a specific service.
Asset Focus / Threat Focus / Service Focus