General Flashcards
What are the…
Five phases of the Threat Intellience Cycle
- Planning & Requirements
- Collection & Processing
- Analysis
- Dissemination
- Feedback
Provide the purpose of…
Planning & Requirements
Threat Intelligence Cycle
- Defining our Goal
- Staying business-aligned
- Consider legal restrictions, regulations
- Determine our most likely threats
- How would they do us harm?
Provide the purpose of…
Collection & Processing
Threat Intelligence Cycle
- Gathering of information
- Maintain consistency to stay organized
- Automate as much as possible
- Select appropriate end-points to collect data from
- Processing & normalizing the collected data
Potential collection end-points include; cloud, phones, routers, servers, apps, laptops, etc…
Provide the purpose of…
Analysis
Threat Intelligence Cycle
- More data means higher chance to prove an attack is happening
- Too much data demands automated tools to sift through the data
- Use of SIEM to automate the correlation of events
Automation could include; Scripts (Bash, Python, PowerShell…)
Provide the purpose of…
Dissemination
Threat Intelligence Cycle
- Internally communicating the findings
- Selecting the appropriate audience(s)
- Communicate the findings to EACH of the audiences. (See types)
- Outside communication? Potentially.
- Types
- Strategic Intelligence
- Operational Intelligence
- Tactical Intelligence
Provide the purpose of…
Feedback
Threat Intelligence Cycle
- New findings, new information
- Lessons Learned from previous steps
- New discoveries since last time
- New tactics to imploy?
- Assign clear list of people, a clear list of tasks to make the cycle better
Whats the time frame of…
Strategic Intelligence
Long-term goals
Whats the time frame of…
Operational Intelligence
Shorter-term goals
Whats the time frame of…
Tactical Intelligence
Real-time goals
What is…
Security Intelligence
How secure are we?
What is…
Cyber Threat Intelligence
How threatening is the world?
* Narrative Sources
* Threat Feeds
Threat feeds are online resources that can be queried. Flow of known vulnerabilities, IP addresses, anti-virus softwares, necessary patches, real-time attacks, etc…
What is… used for?
Historical / Trend Analysis
Used to indicator potential threats
Describe what… is used for
Reconnaisance
As a defender
- What could an attacker find out about us?
- Use of OSINT tools to automate some of the process
Use of open-sourced (public) data to analysis a target (e.g. Social Media, websites, job descriptions, LinkedIN)
What does … stand for?
OSINT
Open-source Intelligence
The process of gathering and analyzing publicly available information to assess threats, make decisions, and/or answer specific questions.
What is a … ?
zone transfer
Usually used to transfer DNS to new server; however could be used to fetch ALL DNS server information if misconfigured poorly