INTS Flashcards

1
Q

What are the seven principles of security intelligence?

A
  1. Real-Time Analysis
  2. Pre-Exploitation Review
  3. Data Collection, normalization and analysis
  4. Actionable Insights
  5. Scalability
  6. Flexibility in Size and Cost
  7. Data Security and Risk Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is security intelligence?

A

The collection and analysis of real-time data gathered from various sources such as networks, users, applications and other infrastructure to respond to security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Continuous monitoring of data across networks and sources to pinpoint any suspicious activities. This aspect of security helps with proactive response and minimizes the chances of the spread of the damage.

A

Real-time analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Preventative measure that helps pinpoint weaknesses before they are exploited by hackers. It helps minimize downtime or operational disruptions for the organization.

A

Pre-exploitation review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Come from a wide array of sources such as networks, logs, threat intelligence feeds, etc. The next step is to normalize or standardize this data to make it easier to analyze and correlate. This enables the organization to identify any patterns that may be the cause of events.

A

Data collection, normalization, and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Actionable insights to enable security teams to make concrete decisions to enhance security maturity. These can include information on indicators of compromise and tactical recommendations such as implementing new security controls, predictions on emerging threats and more.

A

Actionable insights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Provide a scalable foundation because of automation, cloud integrations and a flexible architecture. This enables them to expeditiously gather and process large volumes of data and respond in real-time.

A

Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Small businesses and startups can also leverage these solutions to deal with security threats per their needs and budgets.
Compliance automation tools are also a lucrative solution here, especially for small and medium businesses as they provide enough actionable intelligence and solve for compliance readiness.

A

Flexibility in size and cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security intelligence solutions are only helpful if they help protect data and intellectual property. They provide organizations with tools and insights to protect information against security threats.

A

Data security and risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CIA stands for?

A

Confidentiality, integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CIO stands for?

A

Intent, capability and opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

APT stands for?

A

Advanced Persistent threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IoC stands for?

A

Indicators of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TTP stands for?

A

Techniques, tactics and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The right people have access to information and it is protected against unauthorized access
(CIA or CIO)

A

CIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The reliability and accuracy of information is maintained
(CIA or CIO)

A

CIA

17
Q

The systems are up and running always for the authorized people
(CIA or CIO)

A

CIA

18
Q

Intent is the attacker’s desire or interest to harm an organization
(CIA or CIO)

A

CIO

19
Q

Capability refers to the tools, resources and skill set of the malicious actor to exploit weaknesses
(CIA or CIO)

A

CIO

20
Q

Opportunities are the vulnerabilities that can be exploited such as misconfigurations, unpatched weaknesses etc.
(CIA OR CIO)

A

CIO

21
Q

Targeted cyberattacks that aim to gain long-term access to an organization’s network (persistent) for espionage or data theft. To remain undetected, the attacker uses advanced tactics such as spear phishing, data exflitration, zero-day exploits, etc.

A

ATP

22
Q

Piece of data or evidence to showcase that a system has been breached or infiltrated. In the context of security intelligence, IoC serves as forensic evidence by analysts to detect incidents and respond to threats faster.

A

IoC

23
Q

Methodologies used by attackers to carry out the attack and accomplish the desired goal. Analysts must understand the TTPs to implement or strengthen technical safeguards and enhance their incident response plan.

A

TTP