Threat Intelligence Flashcards

1
Q

What is threat intelligence?

A

The process of collecting, analyzing, and using data related to threats and threat actors to improve security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three types of threat intelligence?

A

Strategic, Tactical, and Operational intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between tactical and strategic threat intelligence?

A

Tactical focuses on specific threats and indicators, while strategic provides high-level insights into trends and risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Indicator of Compromise (IOC)?

A

Evidence of a breach or malicious activity, such as unusual traffic, file changes, or abnormal network activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Threat Actor?

A

An entity, individual, or group behind malicious cyber activities like hacking, phishing, or data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Diamond Model of Intrusion Analysis?

A

A framework that describes cyber threats in terms of four components: Adversary, Capability, Infrastructure, and Victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is OSINT?

A

Open Source Intelligence, which refers to the collection of publicly available data for security purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are TTPs in threat intelligence?

A

Tactics, Techniques, and Procedures—specific methods used by threat actors during cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a threat intelligence platform (TIP)?

A

A system used to collect, organize, and analyze threat data from multiple sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the role of STIX in threat intelligence?

A

Structured Threat Information eXpression (STIX) is a language for sharing cyber threat intelligence in a standardized format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of TAXII in threat intelligence?

A

Trusted Automated eXchange of Indicator Information (TAXII) is a protocol for sharing threat intelligence securely and in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is threat hunting?

A

Proactively searching through networks and systems to detect and isolate advanced threats before they cause damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly