Threat Modelling And Intelligence Flashcards
Architecture centric
Threat modeling approach.
How? - question
Identifies system design component strength and weakness. Weakness is patching for exploit
Threat intelligence
Is evidence based knowledge about emerging threats what can be used to inform control decisions. Is aggregated from reliable sources and cross-correlated for accuracy, analyzed by trained specialists, assessed for relevancy, actionable where includes context, mechanisms, indicators, implications, response/ remediation advice
Threat modeling
Structured process by which potential threats and threat actors can be identified, enumerated and prioritized
OSNIT - open source intelligence
Term used to refer to the data collected from publicity, available sources to be used in an intelligence context. OSNIT framework organized is by topics and tools. This framework is structured collection of tools
Work factor
The time, effort and resources necessary for the attacker to successfully achieve their objective.
CIS-CISA.GOV - cybersecurity and infrastructure security agency
Us gov agency working with government and industry to identify available and prioritize and manage the most significant cybersecurity strategi risks to the nations critical infrastructure
Asset-centric
Threat modeling approach,main question is: Why? - identify of valued assets and notification to attack them.
Attacker-centric
Threat modeling approach - who can do it? This is an identification of adversaries (opponents).