Lecture 7 Flashcards

1
Q

What is the importance of threat intelligence for SOCs?

A

Threat intelligence allows SOCs to prepare and proactively respond to threats rather than reacting after damage has occurred. It provides actionable insights that guide decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Strategic Threat Intelligence?

A

Strategic threat intelligence offers a high-level overview of potential threats to help executives make informed decisions. It focuses on risk and impact to operations, rather than technical details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Tactical Threat Intelligence?

A

Tactical threat intelligence provides specific details about the tactics, techniques, and procedures (TTPs) used by threat actors. It helps technical staff improve defenses and prepare for specific attack methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Operational Threat Intelligence?

A

Operational threat intelligence focuses on specific attack campaigns and their behaviors. It helps SOCs track ongoing threats and understand the methods used by attackers, allowing for more effective defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Technical Threat Intelligence?

A

Technical threat intelligence includes specific technical data such as IP addresses, malware hashes, and indicators of compromise (IOCs). It is used for immediate threat detection and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What differentiates Threat Data from Threat Intelligence?

A

Threat data is raw and unprocessed, often lacking context. Threat intelligence, on the other hand, includes analysis and context, making it actionable for security decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Threat Intelligence Lifecycle?

A

The lifecycle includes the collection, analysis, dissemination, and feedback of threat intelligence. Each step ensures the intelligence is relevant, actionable, and continuously improving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is actionable intelligence important?

A

Actionable intelligence provides clear guidance on what actions to take in response to a threat, making it practical and valuable for immediate use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the sources of Tactical Threat Intelligence?

A

Sources include open-source tools, honeypots, dark networks, scanning technology, malware analysts, and technical experts. These provide detailed insights into attack methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does Operational Threat Intelligence benefit a SOC?

A

It allows the SOC to track specific threat campaigns, understand the threat landscape, and anticipate changes in attack methods, enhancing proactive defense measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the challenges of using Threat Data?

A

Without context and analysis, threat data can be overwhelming and difficult to act upon, making it less useful for informed decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is context important in Threat Intelligence?

A

It helps in understanding the significance and implications of threat data, making it actionable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of feedback in the Threat Intelligence Lifecycle?

A

Feedback helps refine and improve the processes for collecting and analyzing threat intelligence, ensuring it remains relevant and effective over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does Tactical Threat Intelligence improve security tools?

A

By providing insights into TTPs, it helps identify gaps in current defenses and guides the enhancement of security tools and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the value of using multiple sources for Threat Intelligence?

A

Multiple sources provide a comprehensive view of threats, enhancing the SOC’s ability to detect and respond to a wider range of attack vectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly