Threat actors and Vectors Flashcards
Name two wireless encryption protocols that are now outdated starting with the letter W
WEP, WPA
You want WPA2 or later on all of your wireless access points.
What does CVE stand for?
Common Vulnerabilities & Exposures
In threat intelligence, what would the acronym STIX stand for?
Structured Threat Information eXpression
It describes cyber threat information, including motivations, abilities, capabilities, and response information.
In threat intelligence, what does AIS stand for?
Automated Indicator sharing
This is a standardized way to share important threat data.
In threat intelligence, what does TAXII stand for?
Trusted Automated eXchange of Indicator Information.
This is a way of securely sharing STIX data.
What is an IOC?
Indicator Of Compromise.
This is an indicator that there is an intrusion in your network with high confidence.
What is an RFC?
Request for comments.
RFC (stands for Request For Comments) is a document that describes the standards, protocols, and technologies of the Internet and TCP/IP.
Published by the Internet Society (ISOC)
What is the IETF?
Internet Engineering Task Force
What is TTP in threat research?
Tactics, techniques, and procedures.