Week 4 Flashcards

1
Q

Name this: Data that is collected, processed, and analyzed to understand a threat actor’s motives, targets, and attack behaviors

A

Threat intelligence

Threat intelligence is critical for understanding and mitigating potential security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does IDD stand for and what is its focus?

A

IDD = Intelligence Driven Defense. Emphasizes taking action based on threat intelligence

IDD aims to enhance security posture by proactively addressing potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is Intelligence Driven Defense a reactive or proactive measure?

A

Proactive

This approach is designed to anticipate and mitigate threats before they occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What additional aspects does Intelligence Driven Defense encompass?

A

Applying information about emerging threats, vulnerabilities, and security awareness

It goes beyond just collecting and sharing intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Kill Chain?

A

Military concept - defines the structure of an attack

Kill chains are used to understand the phases of an attack and develop defensive strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Cyber Kill Chain?

A

An adapted framework from the military kill chain. It outlines the phases an attacker follows during a cyber intrusion

This framework is crucial for cybersecurity defense strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cyber Kill Chain (1): The attackers gather info about the target, explore vulnerabilities, harvest credentials. The more information the more sophisticated an attack can be

A

Reconnaissance

This phase involves gathering information about the target, exploring vulnerabilities, and harvesting credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

T/F - Reconnaissance involves passive & active modes, physical and dumpster diving

A

True

This phase is crucial for attackers to understand their targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cyber Kill Chain: The attacker creates an attack vector. A possibly customized malicious payload. Packaged for easy delivery, and may set up backdoors.

A

Weaponization

This phase involves creating a customized malicious payload packaged for easy delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cyber Kill Chain (3): The attacker launches the attack. The payload is delivered through various means (e.g. phishing). This marks the point where the attackers weaponized code is introduced into the target environment.

A

Delivery

This marks the introduction of weaponized code into the target environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cyber Kill Chain: Malicious code is executed within the victims system. Allows the attacker to escalate privileges within the compromised system/network. May involve gaining admin/root access.

A

Exploitation

This phase is critical for gaining control over the target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cyber Kill Chain (5): Immediately following the previous phase, an attack vector is installed on the victims system. They may modify critical files to ensure they’re hidden. This is the turning point in the attack lifecycle as the attacker can now assume control.

A

Installation

This is a turning point in the attack lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyber Kill Chain (6): The attacker remotely controls a device or identity within the target system/network. The attacker creates backdoors and expands their access. More points of entry. A persistent presence in the targeted system.

A

Command and Control

This phase allows for persistent access to the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cyber Kill Chain (7): “Objective Achieved”, the attacker may now perform data exfiltration, data destruction, espionage, financial gain, disruption of operation, or encryption for ransom

A

Actions on Objectives

This is the final phase where attackers achieve their goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a critique of the Cyber Kill Chain regarding Perimeter Security?

A

It focuses mostly on perimeter security and malware protection

This critique highlights the limitations of addressing internal threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name the Cyber Kill Chain steps from 1-7 RWDEICA

A

Reconnaissance, Weaponization, Delivery, Exploitation Installation, Command and Control, Actions on Objectives

17
Q

What is a critique of the Cyber Kill Chain regarding Insider Threats?

A

The Cyber Kill Chain doesn’t account for insiders whatsoever

Insider threats can bypass many defenses considered in the kill chain.

18
Q

What is a critique of the Cyber Kill Chain related to the Remote Work Trend?

A

It doesn’t account for remote work

The shift to remote work complicates traditional security models.

19
Q

What is a critique of the Cyber Kill Chain regarding IoT technology?

A

There’s no consideration for the amount of IoT devices that exist now

IoT devices present unique vulnerabilities that the kill chain does not address.

20
Q

What is MITRE ATT&CK?

A

Knowledgebase that tracks cyber adversary tactics, techniques, and behaviors used by threat actors across the entire attack lifecycle

It is a valuable resource for understanding and defending against cyber threats.

21
Q

What does ATT&CK stand for?

A

Adversarial Tactics, Techniques and Common Knowledge

This framework is used to categorize and analyze adversary actions.

22
Q

True or False: The MITRE ATT&CK Framework is based on real world observations.

A

True

This foundation enhances its relevance and applicability in real-world scenarios.

23
Q

How does the MITRE ATT&CK framework help a security operations team?

A

Deduces adversarial motivations and behavior and how they relate to defense

This insight aids in developing effective defensive strategies.

24
Q

True or False: The MITRE ATT&CK framework is a private service.

A

False. It’s a public service used to better understand the different ways bad actors might operate

This accessibility makes it a widely used tool in cybersecurity.

25
Q

What are Tactics in the MITRE ATT&CK framework?

A

The adversary goals and why

Tactics define the high-level objectives of adversaries.

26
Q

What are Techniques in the MITRE ATT&CK framework?

A

How adversaries achieve tactical goals

Techniques provide insight into the methods used by attackers.

27
Q

What are Procedures in the MITRE ATT&CK framework?

A

Specific implementations to execute a technique or sub-technique

Procedures offer detailed examples of how techniques are applied.

28
Q

What three areas does the MITRE ATT&CK Framework cover?

A

Enterprise, Mobile, and Industrial Control Systems

This broad coverage helps address diverse cybersecurity challenges.

29
Q

What is the Pyramid of Pain?

A

A conceptual model for the effective use of Cyber Threat Intelligence

It emphasizes increasing the cost of adversaries’ operations.

30
Q

What is the focus of the Pyramid of Pain?

A

Increasing the cost of their adversaries’ operations. Hit them where it hurts

This strategy aims to deter attackers by making their efforts more costly.