Threat Intelligence and Sources Flashcards

1
Q

Timeliness

A

Property of an intelligence source that ensures it is up-to-date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Relevancy

A

Property of an intelligence source that ensures it matches the use cases intended for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Accuracy

A

property of an intelligence source that ensures it produces effective results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidence Levels

A

Property of an intelligence source that ensures it produces qualified statements about reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Proprietary

A

Threat Intelligence is very widely provided as a commercial service offering, where access to updates and research is subject to a subscription fee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Closed-Source

A

Date that is derived from the provider’s own research and analysis efforts, such as data from honeynets that they operate, plus information mined from its customers systems, suitably anonymized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Open-Source

A

Data that is available to use without subscription, which may include threat feeds similar to the commercial providers and may contain reputation lists and malware signature databases.

  1. US-CERT
  2. UK’s NCSC
  3. AT&T Security (OTX)
  4. MISP
  5. VirusTotal.
  6. Spamhaus
  7. SANS ISC Suspicious Domains
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Open-Source Intelligence (OSINT)

A

Methods of obtaining information about a person or organization through public records, websites, and social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat Hunting

A

A cyber security technique designed to detect presence of threat that have not been discovered by a normal security monitoring. Threat Hunting has less impact than a penetration test.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Establishing a Hypothesis

A

A hypothesis is derived from the threat modeling and is based on potential events with higher likelihood and higher impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Profiling Threat Actors and Activities

A

Involves the creation of scenario that show how a prospective attacker might attempt an intrusion and what their objectives might be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat hunting relies on the usage of the tools developed for regular security monitor and incident reponse

A
  • Analyze network traffic
  • Analyze the executable process list.
  • Analyze other infected host.
  • identify how the malicious process was executed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threat Hunting consumes a lot of resources and time to conduct, but can yield a lot of benefits

A
  • improve detection capabilities.
  • integrate intelligence.
  • reduces attack surface.
  • Block attack vectors.
  • identify critical assets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly