Section 24.229 Threat Hunting Flashcards

Objective 4.8 Explain appropriate incident response activities

1
Q

Threat Hunting

A

Proactive cybersecurity technique to detect threats that haven’t been discovered by normal security monitoring

■ Involves actively seeking out potential threats within your network, as opposed to waiting for them to trigger alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Steps in Threat Hunting

Establishing a Hypothesis

A

Conduct threat modeling to identify potential threats with high impact

● Use threat intelligence to form hypotheses about threat actors or
campaigns that may target your organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Steps in Threat Hunting

Profiling Threat Actors and Activities

A

Create scenarios to understand how attackers might attempt an intrusion

● Determine the type of threat actor (insider, hacktivist, criminal, nation state)

● Identify their objectives and potential targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Steps in Threat Hunting

Threat Hunting Process

A

● Utilises security monitoring and incident response tools

● Analyses logs, system data, file systems, and registry information

● Focuses on finding threats not detected by existing rules

● Start by assuming that the current rules haven’t flagged potential threats

● Seeks new tactics, techniques, and procedures used by threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key Considerations

A

■ Threat hunters must stay updated on the latest attacks and threats

■ Use advisories and bulletins published by vendors and researchers to identify new TTPs and vulnerabilities

■ Utilise intelligence fusion and threat data, combining SIEM logs with real-world threat feeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Benefits of Threat Hunting

A

■ Improves detection capabilities by identifying threats that bypass existing defenses

■ Enhances threat intelligence by correlating external threat feeds with internal logs

■ Provides actionable intelligence to strengthen security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly