Threat Intelligence Flashcards
What are the different classifications of Threat Intelligence
?
-
Strategic Intel
- high-level intel that looks into the organisation’s threat landscape and maps out the risk areas based on trends, patterns and emerging threats that may impact business decisions
-
Technical Intel
- examines evidence and artefacts of attacks an adversary uses
- create a baseline attack surface to analyse and develop defence mechanisms
-
Tactical Intel
- assesses adversaries’ tactics, techniques, and procedures (TTPs)
-
Operational Intel
- assesses an adversary’s specific motives and intent to perform an attack
- use this intel to understand the critical assets available in the organisation (people, processes, and technologies) that threat actors may target
Which intel classification is known as IOC-based Threat Intelligence
?
Technical Intel
How would you compare Threat Intelligence Producers and Threat Intelligence Consumers?
- Producers: gather, analyse and disseminate threat intelligence data for others and themselves
- Consumers: consume Threat Intelligence created by Producers
What are the IOCs that are commonly distinguised in Threat Intelligence feeds
?
-
Domains
- typically attributed to URLs used to host malicious files, C2 callbacks or email domains used for spam
-
IP Addresses
- commonly attributed to addresses known to execute attacks seen from external assets or outbound callbacks from malware
What are some of the steps conducted in Intelligence-Driven Prevention?
- IP/Domain Blocking via Firewall
- Domain Blocking through Email Gateways
- Domain Blocking through DNS Sinkhole
What acronym is commonly used for Threat Intelligence?
CTI (Cyber Threat Intelligence
)
What is the primary goal of CTI?
understand the relationship between your operational environment and your adversary and how to defend your environment against any attacks
To be able to understand the relationship between your operational environment and your adversary and how to defend your environment against any attacks, what questions should be asked?
- Who’s attacking you?
- What are their motivations?
- What are their capabilities?
- What artefacts and indicators of compromise (IOCs) should you look out for?
What are the categories of different sources from which threat intelligence is gathered?
-
Internal
- corporate security events, vulnerability assessments and incident response reports
-
Community
- open web forums & dark web communities for cybercriminals
-
External
- threat intel feeds (Commercial & Open-source)
- government data, publications, social media, financial and industrial assessments
What is the CTI lifecycle
?
-
Direction
- every threat intel program requires to have objectives and goals defined
-
Collection
- security analysts will gather the required data to address them
-
Processing
- data is extracted, sorted, organised, correlated with appropriate tags and presented visually in a usable and understandable format to the analysts
-
Analysis
- once the information aggregation is complete, security analysts must derive insights
-
Dissemination
- different organisational stakeholders will consume the intelligence in varying languages and formats
-
Feedback
- analysts rely on the responses provided by stakeholders to improve the threat intelligence process and implementation of security controls
What is the purpose of Trusted Automated eXchange of Indicator Information (TAXII)
?
- facilitate automated sharing of information about security threats in a standardized format, enhancing the ability of organizations and security systems to detect and respond to cyber threats
- define protocols for securely exchanging threat intel to have near real-time detection, prevention and mitigation of threats
What are the two sharing models supported by Trusted Automated eXchange of Indicator Information (TAXII)
?
-
Collection
- threat intel is collected and hosted by a producer upon request by users using a request-response model
-
Channel
- threat intel is pushed to users from a central server through a publish-subscribe model
What is Structured Threat Information Expression (STIX)
?
language developed for the “specification, capture, characterisation and communication of standardised cyber threat information”
What is Threat Intelligence
?
collection of data about existing or emerging threats
What does Threat Intelligence include?
information about malicious IPs, domains, file hashes, tactics, techniques, and procedures (TTPs) of threat actors