Threat Hunting Flashcards
A cyber security technique designed to detect the presence of threats that have not been discovered by a normal security monitoring, and is potentially less disruptive than penetration testing.
Threat Hunting
Derived from threat modeling and is based on potential events with a higher likelihood and higher impact.
Establishing a hypothesis
Involves the creation of scenarios that show how a prospective attacker might attempt an intrusion and what their objectives might be.
Profiling threat actors and activities
What are 4 components of regular monitor and incident response?
Analyze network traffic.
Analyze the executable process list.
Analyze other infected hosts.
Identify how the malicious process was executed.
What are some benefits to threat hunting?
Improves detection capabilities. Integrates intelligence. Reduces attack surface Blocks attack vectors Identifies critical assets