Exploring Threat Intelligence and Threat Hunting Concepts Flashcards

1
Q

Advanced Persistent

A

Threat actors with the ability to craft novel exploits and techniques to obtain, maintain, and diversify unauthorized access to network systems over a long period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Command and Control

A

Infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exploits

A

A specific method by which malware code infects a target host, often via some vulnerability in a software process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Metasploit

A

A platform for launching modularized attacks against known software vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tactics, techniques, and procedures (TTPs)

A

TTPs are the methods used to conduct an action, such as performing an attack, and can be beneficial when attempting to ascertain attack patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

User and Entity Behavior Analytics(UEBA)

A

A system that can provide automated identification of suspicious activity by user accounts and computer hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Adversarial Tactics, Techniques, and Common Knowledge(ATT&CK)

A

A knowledge base maintained by the MITRE Corporation for listing and explaining specific adversary tactics, techniques, and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Open-source Intelligence(OSINT)

A

Publicly available information plus the tools used to aggregate and search it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information Sharing and Analysis Centers(ISACs)

A

A not-for-profit group set up to share sector-specific threat intelligence and security best practices among its members.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidence Level

A

A metric that helps rank or score threat intelligence to help isolate highly applicable or highly likely threat intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat Hunting

A

A cybersecurity technique designed to detect presence of threats that have not been discovered by normal security monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyber Threat Intelligence

A

The process of investigating, collecting, analyzing, and disseminating information about emerging threats and threat sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Indicators of Attack(IoAs)

A

Signs or clues indicating a malicious attack on a system or network is currently occurring. These include, but are not limited to, unusual network traffic, strange log file entries, or suspicious user account activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Crowdsourced

A

A process in which a large group of individuals, usually from the public, are asked to contribute to a project or task. It often involves the collection of ideas, information, opinions, or feedback from a wide range of people, typically through an online platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Indicators of Compromise(IoCs)

A

A sign that an asset or network has been attacked or is currently under attack.

17
Q

Honeypots

A

A host, network, or file set up with the purpose of luring attackers away from assets of actual value and/or discovering attack strategies and weaknesses in the security configuration.

18
Q

Intrusion Detection Systems

A

A security appliance or software that analyzes data from a packet sniffer to identify traffic that violates policies or rules.

19
Q
A