Threat Intelligence Flashcards
Threat Intelligence Sources:
Facilitate risk management. Hardening can reduce incident response time. Provide cybersecurity insight. Adversary tactics, techniques, and procedures. (TTP) Threat maps.
Closed/proprietary. OSINT (Open-Source Intelligence)
Government reports - Media - Academic papers.
Closed/proprietary.
File/code repositories for example: GitHub
Vulnerability Databases:
Common vulnerabilities and exposures (CVES)
Dark Web/Dark Net
Tor network, Tor Web browser. Encrypted anonymous connections, not indexed by search engines, Tor encryption and anonymity.
Automated Indicator Sharing (AIS)
Exchange of cybersecurity intelligence (CI) between entities.
Structured Threat Information eXpression (STIX)
A form of AIS. Data exchanged format for cybersecurity.
Trusted Automated eXchange Intelligence information (TAXI)
Like RSS feed for threats. Consists of TAXII servers and clients. Real-time cyber intelligence feeds.