Lesson 2:Using Threat Intelligence Flashcards
Open-source intelligence
a collection and analysis of information that is gathered from publicly available sources.
Open-source intelligence is primarily used in
national security, law enforcement, and business intelligence functions.
Closed source intelligence consists of
government or private data, which is not available through open inquiry.
Closed source intelligence is primarily used in
business information, law enforcement data, educational records, banking records, and medical records.
When assessing threat intelligence which three factors should you consider?
timeliness, relevancy, and accuracy of intelligence sources
Confidence scores allow organizations to
filter and use threat intelligence based on how much trust they can give it.
Why does a lot of threat intelligence start with a lower confidence score
that score increases as the information solidifies
What does (STIX) stand for?
Structured Threat Information Expression
Structured Threat Information Expression (STIX) is an
XML language originally sponsored by the U.S. Department of Homeland Security.
Using a single threat feed can leave you in the dark! Many organizations leverage
multiple threat feeds to get the most up-to-date information.
- Requirements Gathering:
a. Assess what security breaches or compromises you have faced
b. what information could have prevented or limited the impact of the breach
c. what controls and security measures were not in a place that would have mitigated the breach
- Data Collection:
a. This phase may repeat as additional requirements are added or as requirements are refined based on available data and data sources.
- Data Processing and Analysis: The data that you gathered will likely be in several different formats.
You must process the data to allow it to be consumed by whatever tools or processes
(TAXII) protocol
Trusted Automated Exchange of Indicator Information
- Intelligence Dissemination
Data is distributed to leadership and operational personnel who will use the data as part of their security operations role.
- Feedback gathering feedback contributes to the continuous
improvement of security and it should be used to improve the overall output of your threat intelligence program.
In the United States, organizations known as Information Sharing and Analysis Centers (ISACs) help
infrastructure owners and operators share threat information, as well as provide tools and assistance to their members.
The CySA+ exam objectives specifically mention three areas in this information sharing grouping:
healthcare, financial services, and aviation.
The CySA+ exam objectives specifically call out four common threat actors:
Nation-state actors
Organized Crime
Hacktivist
Insider Threat
Nation-state actors often have the most access to
resources, including tools, talent, equipment, and time. ``
Organized crime focused attacks aimed at
financial gain. Ransomware attacks are an increasingly common example of this type of threat from organized crime groups.