Threat Intelligence Flashcards

1
Q

Threat Intelligence Sources:

A

Facilitate risk management. Hardening can reduce incident response time. Provide cybersecurity insight. Adversary tactics, techniques, and procedures. (TTP) Threat maps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Closed/proprietary. OSINT (Open-Source Intelligence)

A

Government reports - Media - Academic papers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Closed/proprietary.

A

File/code repositories for example: GitHub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability Databases:

A

Common vulnerabilities and exposures (CVES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dark Web/Dark Net

A

Tor network, Tor Web browser. Encrypted anonymous connections, not indexed by search engines, Tor encryption and anonymity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Automated Indicator Sharing (AIS)

A

Exchange of cybersecurity intelligence (CI) between entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Structured Threat Information eXpression (STIX)

A

A form of AIS. Data exchanged format for cybersecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trusted Automated eXchange Intelligence information (TAXI)

A

Like RSS feed for threats. Consists of TAXII servers and clients. Real-time cyber intelligence feeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly