Direction And Review Flashcards
Developing intelligence requirements is a one time process that only needs to be done at the beginning of an intelligence project. T/f
False: IRs are constantly reviewed with the client
What is an example of best practice when designing PIRs?
-Focusing only on threats that have been seen in organisations networks in the past
-relying solely on stakeholder requests to identify PIRs
-defining as many PIRs as possible to ensure that all potential threats are covered
-balancing the need for specificity with flexibility
balancing the need for specificity with flexibility
Intelligence requirements should be developed in isolation without feedback or input from other stakeholders within the organisation. True or false
False - they should have constant feedback from many stakeholders and be revised until suitable tk their specific needs
Using the MoSCow rule helps to ensure that critical requirements are not overlooked or deferred true or false
True MoSCoW
Must have
Should have
Could have
Won’t have
Helps to focus on critical intelligence needs whilst addressing others that are unnecessary or resources won’t permit
What is the role of the stakeholder engagement in the direction phase of the intelligence cycle?
- to disseminate intelligence products to stakeholders
- to help identify and prioritise intelligence requirements
- to collect raw data from stakeholders
- to ensure that stakeholders are aware of the intelligence being collected and analysed
To help identify and prioritise intelligence requirements
What type of information is typically included in intelligence requirements?
- all of these are correct
- predictive data
- historical data
- real time data
All of these
predictive data
- historical data
- real time data
What metrics are used to evaluate effectiveness of cyber threat intelligence projects during project review?
- return on investment and cost benefit analysis
- time to detection and response time
- threat intelligence accuracy and completeness
- all of these are correct
All of these are correct
return on investment and cost benefit analysis
- time to detection and response time
- threat intelligence accuracy and completeness
How are PIRs different from IRs?
PIRs are high priority IRs
Which of the following is an intelligence requirement?
- the threat actor responsible for a recent cyber attack
- a list of all vulnerabilities on a companies network
- the number of employees in a company’s IT department
- the make and model of a company’s servers
Threat actor responsible for recent cyber attack
The MoSCoW is a technique used in project management true or false
True
Must have
Should have
Could have
Won’t have
Intelligence requirements are fixed over time and do not change regardless of the threat landscape true or false
False
IRs always have to be approved by the main stakeholder (customer) true or false
True
The could have category represents requirements that are desirable but not necessary and can be included if there is time and budget. True or false
True
The Moscow rule is a good way to manage stakeholder expectations and prioritise requirements true/false
True
How often are PIRs updated?
Weekly, monthly, annually or as needed based on changes in operational environment
As needed based on changes in environment