Threat Intelligence and Sources Flashcards
Timeliness
Property of an intelligence source that ensures it is up-to-date
Relevancy
Property of an intelligence source that ensures it matches the use cases intended for it.
Accuracy
property of an intelligence source that ensures it produces effective results
Confidence Levels
Property of an intelligence source that ensures it produces qualified statements about reliability.
Proprietary
Threat Intelligence is very widely provided as a commercial service offering, where access to updates and research is subject to a subscription fee.
Closed-Source
Date that is derived from the provider’s own research and analysis efforts, such as data from honeynets that they operate, plus information mined from its customers systems, suitably anonymized
Open-Source
Data that is available to use without subscription, which may include threat feeds similar to the commercial providers and may contain reputation lists and malware signature databases.
- US-CERT
- UK’s NCSC
- AT&T Security (OTX)
- MISP
- VirusTotal.
- Spamhaus
- SANS ISC Suspicious Domains
Open-Source Intelligence (OSINT)
Methods of obtaining information about a person or organization through public records, websites, and social media.
Threat Hunting
A cyber security technique designed to detect presence of threat that have not been discovered by a normal security monitoring. Threat Hunting has less impact than a penetration test.
Establishing a Hypothesis
A hypothesis is derived from the threat modeling and is based on potential events with higher likelihood and higher impact
Profiling Threat Actors and Activities
Involves the creation of scenario that show how a prospective attacker might attempt an intrusion and what their objectives might be.
Threat hunting relies on the usage of the tools developed for regular security monitor and incident reponse
- Analyze network traffic
- Analyze the executable process list.
- Analyze other infected host.
- identify how the malicious process was executed
Threat Hunting consumes a lot of resources and time to conduct, but can yield a lot of benefits
- improve detection capabilities.
- integrate intelligence.
- reduces attack surface.
- Block attack vectors.
- identify critical assets.