Product Dissemination Flashcards
What is the main objective of cyber threat intelligence sharing initiatives?
To facilitate the sharing of threat data between organisations
To provide a centralised repository for threat data
To standardise the format of threat data shared between organisations
What is the importance of cyber threat intelligence sharing initiatives in improving national security?
It enables government agencies to pool resources and build a collective defence against cyber threats
It provides government agencies with central repositories of threat data to aid in their threat detection and response efforts
It enables sharing of data between government agencies
How is the stix language structured?
As a collection of XML documents
What is the relationship between taxii and stix?
Taxii provides a way of exchanging stix formatted threat intelligence information
What type of format should the cyber threat intelligence product be disseminated in?
Text based format
What is the purpose of stix?
To provide a commmon language for sharing and comparing threat intelligence
What does stix use to describe various aspects of a threat?
Standardises vocabularies
What does stix use to describe various aspects of a threat?
Standardised vocabularies
What data exchange patterns does taxii support?
Request-response, subscription and push-based models
What is the main advantage of using stix and taxii for sharing threat intelligence?
Increased speed and efficiency in sharing threat information
What is the primary goal of ISAC?
To improve the security of a particular sector or industry by facilitating the exchange of information about cyber threats
What is a limitation of ISAC?
They may not have full participation from all organisations in a sector or industry
How does a threat intelligence platform help organisations identify threats?
By comparing known threats against data collected from multiple sources
How can a threat intelligence platform help organisations mitigate threats?
By providing actionable intelligence that allows security teams to respond quickly and effectively
Which of the following is a benefit of using structured data in cyber threat intelligence?
It is easily shareable and machine readable