INTS Flashcards
What are the seven principles of security intelligence?
- Real-Time Analysis
- Pre-Exploitation Review
- Data Collection, normalization and analysis
- Actionable Insights
- Scalability
- Flexibility in Size and Cost
- Data Security and Risk Management
What is security intelligence?
The collection and analysis of real-time data gathered from various sources such as networks, users, applications and other infrastructure to respond to security threats.
Continuous monitoring of data across networks and sources to pinpoint any suspicious activities. This aspect of security helps with proactive response and minimizes the chances of the spread of the damage.
Real-time analysis
Preventative measure that helps pinpoint weaknesses before they are exploited by hackers. It helps minimize downtime or operational disruptions for the organization.
Pre-exploitation review
Come from a wide array of sources such as networks, logs, threat intelligence feeds, etc. The next step is to normalize or standardize this data to make it easier to analyze and correlate. This enables the organization to identify any patterns that may be the cause of events.
Data collection, normalization, and analysis
Actionable insights to enable security teams to make concrete decisions to enhance security maturity. These can include information on indicators of compromise and tactical recommendations such as implementing new security controls, predictions on emerging threats and more.
Actionable insights
Provide a scalable foundation because of automation, cloud integrations and a flexible architecture. This enables them to expeditiously gather and process large volumes of data and respond in real-time.
Scalability
Small businesses and startups can also leverage these solutions to deal with security threats per their needs and budgets.
Compliance automation tools are also a lucrative solution here, especially for small and medium businesses as they provide enough actionable intelligence and solve for compliance readiness.
Flexibility in size and cost
Security intelligence solutions are only helpful if they help protect data and intellectual property. They provide organizations with tools and insights to protect information against security threats.
Data security and risk management
CIA stands for?
Confidentiality, integrity and availability
CIO stands for?
Intent, capability and opportunity
APT stands for?
Advanced Persistent threats
IoC stands for?
Indicators of Compromise
TTP stands for?
Techniques, tactics and procedures
The right people have access to information and it is protected against unauthorized access
(CIA or CIO)
CIA