Topic 2B: Threat Intelligence Flashcards
Dark web
Internet locations kept hidden from search engines with encryption and anonymization
Behavioral threat research
narrative commentary describing examples of attacks and TTPs gathered through primary research sources
Reputational threat research
Repository of known threat spaces, including signatures, IP addresses, DNS
Threat data
Computer data that can correlate events observed on a customer’s own networks and logs with known TTP and threat actor indicators
Tactic, technique, procedure
Generalized statement of adversary behavior
Indicator of Compromise
Residual sign of successful or ongoing attack
Threat data feed
Signatures and pattern matching applied to an automated feed
STIX
Standard Threat Information Expression: a universal terminology for describing IoCs
TAXII
Trusted Automated Exchange of Indicator Information: the protocol for communicating CTI
CTI
Cyber Threat Intelligence
AIS
Automated Indicator Sharing: a DHS program for ISAC members and private members to subscribe to CTI sharing
File code repository
A web location hosting malware signatures
CVEs
Common Vulnerabilities and Exposures: the magic list MITRE maintains
Machine Learning
A sub feature of AI where a machine parses input data to make decisions with it. ML is capable of modifying its own algorithms to gradually improve decision making