Lesson 2 Flashcards
Vunernability, threat, risk
Vulnerability + Threat = Risk (Impact*liklihood)
Vulnerability = Asset Value, Ease of Exploit
Threat - Internal/External -malicious/acciddntal Threat Vector
Hats
Black, white, gray
APT
Advanced Persistent Threat refers to the ongoing ability of an adversary to compromise network
security—to obtain and maintain access—using a variety of tools and techniques.
False flag
disqusing the source and blaming someone else
Attack surface
Points where an attacker can discover/exploit vulnerabilities in a
network or application
Vectors
- Direct access • Removable media • Email • Remote and wireless • Supply chain • Web and social media • Cloud
ISO 27001
Information Security Management Systems -
Infosec rules and requirements used by many governing bodies to create compliance regulations.
ISO 27002
Information Security Best Practices-
Outlines security controls and suggest how to select the right one to fit a organizations needs
ISO 27701
Privacy Information Management
privacy
ISO 3100
Risk Management Best Practices
TTPs
Tactics, techniques and procecedures (TTPs)
- Generalized statement of adversary behavior
- Campaign strategy and approach (tactics)
- Generalized attack vectors (techniques)
- Specific intrusion tools and methods (procedures)
CTI
cyber threat intelligence (CTI) - Reputation/threat data feeds
OSINT
Open source intelligence (OSINT)—some companies operate threat intelligence
services on an open-source basis, earning income from consultancy rather than
directly from the platform or research effort.
IoC
Indicators of Compromise
- Specific evidence of intrusion
- Individual data points
- Correlation of system and threat data
- AI-backed analysis
- Indicator of attack (IoA)
Threat Data Feeds
• Structured Threat Information exchange (STIX) • Trusted Automated Exchange of Indicator Information (TAXII) • Automated Indicator Sharing (AIS) • Threat maps • File/code repositories • Vulnerability databases and feeds