Training Deck - Recorded Future University Flashcards

1
Q

What are the three Pillars of Security?

A

Confidentiality

Integrity

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the “Triad” also called? Short version?

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the projected Value of Cyber Security in 2030?

A

over 500 Billion $ oder 500 Milliarden Euro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does TTP stand for?

A

Tactics, Techniques and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Tactics

A

The overall objective of an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Technique

A

A method used by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Procedure?

A

The Features and the Tools and Methods used by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are iOc’s

A

Indicators of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does NIST stand for?

A

The National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the six deterring factors the NIST says defines Security?

A

Deterrence
Avoidance
Prevention
Detection
Recovery
Correction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wie wird Intelligence von Recorded Future definiert

A

data and information collected and analyzed to assist decision-makers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Threat Intelligence?

A

Threat Intelligence is the knowlage that allows you to prevent or defend yourself against attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two factors that define Threat Intelligence?

A

Threat Intelligence is all about understanding the bad guys—the hackers, malware, and techniques they use to attack. It looks at external threats that could harm your organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Security Intelligence?

A

Security Intelligence is broader. It looks at everything related to protecting your company—both from inside and outside. It combines data from your internal systems (like logs, firewalls, and alerts) with external information to give a full picture of your security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Information Security?

A

The Protection of Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Cyber Security?

A

Cybersecurity refers to the practices, measures, and controls designed to ensure the confidentiality, integrity, and availability (CIA) of data and systems in the digital realm.

It focuses exclusively on protecting digital assets, such as networks, applications, and data in cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the difference between Information Security and Cyber Security?

A

Information = Security of files in all forms - Digital and also hand written
Cyber Security = Security of digital information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does APT mean

A

Advanced Persistant Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does FAIR stand for

A

Factor Analysis of Information Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the FAIR Institute

A

The FAIR Institute is a research-driven not-for-profit organization dedicated to advancing the discipline of cyber and operational risk management through education, standards and collaboration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the RISK formula

A

Vulnerability + Threat = RISK (Likelihood & Impact)

22
Q

Give me three excamples for an IOC

A

Virus signatures
IP addresses
Hashes of malware files
URLs
Domain names of botnet command and control servers

23
Q

What is Data?

A

Hashes, IP address etc. Data usually doesnt tell you much and needs to be investigated furtherW

24
Q

What is Information?

A

Information is Data with Context!

25
Q

What is the main difference between Data and Information?

A

The main difference between Data and Information is Context

26
Q

What is Intelligence?

A

Intelligence is the outcome of the Analysis of Data and Information - It is actionable

27
Q

What does SOAR stand for?

A

Security, Orchestration, Automation, and Response

28
Q

What are the four Stages of Intelligence Process

A

Work together, collaborate
360 Degree visibility
Automatisation and Integration
Alignment with the Organization and Security Use Cases

29
Q

What is Operational Intelligence

A

Its the “hands on” Intelligence

30
Q

What is Strategic Intelligence

A

High-level analysis of an organization’s present and future threat landscapes

31
Q

What is the difference between Operational Intelligence and Strategic Intelligence?

A

Operational Intelligence is knowing what to do in the moment.

Strategic Intelligence is knowing how to prevent those moments from happening.

32
Q

What is an Attack Vector and give me 4 Attack Vectors

A

A specific paths, methods, or scenarios that can be exploited
Email
Software Vurnabilites
Insider Threats

33
Q

What is an unknown Vulnerability called? As in unknown to the software Developers

A

Zero Day Vurneabilty

34
Q

What is the difference between the Surface Web and the Deep Web?

A

Surface doesnt need login - Deep web needs login (excample - Go to www.recordedfuture.com - Will not get you access to the Platform that is on the deepweb / need username and password to access)

35
Q

What are each Intelligence Life cycle called

A

Direction
Collection
Processing
Analysis
Dissemination
Feedback
Direction

36
Q

What is the Direction phase also called?

A

This step is also known as the planning phase.

37
Q

What are the three sources the collection Phase is taking their information?

A

Internal Sources
Technical Source
Human Source

38
Q

What are Entities? In german

A

Ein Substantiv - Dinge, Personen, Plätze

Entität:
1. Objekte
2. Einheiten
3. Elemente
4. Instanzen

39
Q

Was sind Ontologies?

A

English: Meaningful relationship between Entities
German: Beziehung zwischen Entitäten

Zb; USA, US, United States, New York, Statue of Liberty, White house

40
Q

What are NLPs

A

Natural Language Processing - Computer Intelligence that takes large unstructured text and makes it readable to people

41
Q

Where all these Entities coming from and how are the Ontologies created?

A

Automated Collection and Classification of Threat Data
Machine Learning and NLP National Language Processing and

We use both of these technologies to collecting and classify the Threat data

42
Q

Tell me the 5 Steps of NLP

A

Text Extraction
Text Classification
Parts of Speech Tagging
Entity Recognicion
Event Extraction

43
Q

What is the input of Risk Score.. from where?

A

700.000 Web Sources
30 Threat Feeds

44
Q

Additional risk evidence will increase a Risk Score within the risk band, but no amount of additional evidence will move the score to a higher band

A

yes

45
Q

What is an RFI

A

Request for Information

46
Q

There are three types of reports you can generate with Recorded Future AI:

A

Ransomeware Reports

Threat Landscape Reports

General Reports

47
Q

Where is Collective Insight being utilised

A

TI and SecOps

48
Q

How does Brand check for Logo abuse?

A

It scans the Hasfiles of Logos and scans it with urlscan.ie

49
Q

How many image hash files can you add to the watch list?

A

10

50
Q

What is URLSCAN.IO

A

a powerful scanner technology that allows IT security and risk management professionals to analyze and understand the potential risks associated with a particular URL.

51
Q

What are the two was RF is scanning for Logo Abuse

A

One: Via image hash that is scanned via URLScan.io
Two: If any of the currated logos apear on malicious webpage - this only works if the logo has been currated by RF

52
Q

What is IAB

A

Initial Access Broker the first link of Threat Actors in a Ransomeware. The person that gains access to first and sells it on to the next line to the affiliates who than do the attack and either encrypt or steal data, after that the next link is the