Threat Hunting Flashcards

1
Q

Threat Modeling

A

the process of identifying and assessing the possible threat actors and attack vectors that pose a risk to the security of an app, network, or other system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack Surface vs Vector

A

Point a network receives internal/external connection (network, apps, clous services, website) vs a specific path a threat actor gains access to a system (cyber, human, physical)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat Hunting

A

Cybersecurity technique designed to detect presence of threats that
have not been discovered by normal security monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Email Harvesting

A

OSINT technique to gather email from a domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Harvesting Techniques

A

whois - public list of all registered domains and admins
DNS Zone transfer - replicate DNS database across DNS servers
DNS Harvesting - OSINT gather info about domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AbuseIPDB

A

A community-driven database that keeps track of IP addresses reported for abusive behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Deep web vs dark web

A

Sensitive info not searchable to public intel vs Illegal activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bug Bounty

A

a way for companies to crowdsource security testing of their software services and applications to identify and address potential security issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly