Lesson 2 Flashcards
Vunernability, threat, risk
Vulnerability + Threat = Risk (Impact*liklihood)
Vulnerability = Asset Value, Ease of Exploit
Threat - Internal/External -malicious/acciddntal Threat Vector
Hats
Black, white, gray
APT
Advanced Persistent Threat refers to the ongoing ability of an adversary to compromise network
security—to obtain and maintain access—using a variety of tools and techniques.
False flag
disqusing the source and blaming someone else
Attack surface
Points where an attacker can discover/exploit vulnerabilities in a
network or application
Vectors
- Direct access • Removable media • Email • Remote and wireless • Supply chain • Web and social media • Cloud
ISO 27001
Information Security Management Systems -
Infosec rules and requirements used by many governing bodies to create compliance regulations.
ISO 27002
Information Security Best Practices-
Outlines security controls and suggest how to select the right one to fit a organizations needs
ISO 27701
Privacy Information Management
privacy
ISO 3100
Risk Management Best Practices
TTPs
Tactics, techniques and procecedures (TTPs)
- Generalized statement of adversary behavior
- Campaign strategy and approach (tactics)
- Generalized attack vectors (techniques)
- Specific intrusion tools and methods (procedures)
CTI
cyber threat intelligence (CTI) - Reputation/threat data feeds
OSINT
Open source intelligence (OSINT)—some companies operate threat intelligence
services on an open-source basis, earning income from consultancy rather than
directly from the platform or research effort.
IoC
Indicators of Compromise
- Specific evidence of intrusion
- Individual data points
- Correlation of system and threat data
- AI-backed analysis
- Indicator of attack (IoA)
Threat Data Feeds
• Structured Threat Information exchange (STIX) • Trusted Automated Exchange of Indicator Information (TAXII) • Automated Indicator Sharing (AIS) • Threat maps • File/code repositories • Vulnerability databases and feeds
STIX
Structured Threat Information
expression (STIX)
describes
standard terminology for IoCs and ways of indicating relationships between them.
TAXII
Trusted Automated Exchange
of Indicator Information
provides a means for transmitting CTI data
between servers and clients.
AIS
Automated Indicator Sharing
a service offered by the Department of Homeland Security (DHS) for companies to participate in threat intelligence sharing
Threat map
animated graphic showing the source, target, and type of attacks
that have been detected by a CTI platform.
File/code repository
holds signatures of known malware code.
The code samples derive from live customer systems and (for public repositories) files
that have been uploaded by subscribers.
• Predictive analysis
- Threat forecasting
* Monitor “chatter”