Why Threat Intelligence Can be Useful Flashcards

1
Q

HOW IS INTELLIGENCE VALUABLE?

A

If used correctly, threat intelligence has the capability to provide a number of benefits for organizations of any size. Below are a number of examples of how this security practice can provide value to a business by providing in-depth context, prioritization, enrichment, and building a network with other organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyber Threat Context

A

While a risk analysis may take a very brief look at the threat actors out there and the chance that the organization will be attacked by them, having a dedicated threat intelligence function could allow the business to perform in-depth research on the threats that are out there, and use historic events and targeting to truly determine what the chances are of being in their crosshairs. Proactive defensive measures can be taken to further reduce the risk, such as giving a vulnerability management team context around the vulnerabilities that are identified during a scan, helping to prioritize patching, and reducing the attack surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

INCIDENT PRIORITIZATION

A

Having two incidents occur simultaneously can be draining on resources, and it’s crucial that the incident with the highest potential impact is given the right attention and resources so it can be dealt with before damage occurs. Threat intelligence context can potentially give incident responders the information they need to make informed decisions about which incident to prioritize based on the threat actors that have been known to target similar organizations, and by retrieving indicators of compromise enrichment to get as much information from every piece of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

INVESTIGATION ENRICHMENT

A

Giving context to an investigation can make a huge difference. An IP on the internet scanning the organization’s public IP range is very common, and normally these IPs are either blocked (if they are sending a high volume of requests) or left alone as the perimeter firewalls are actively blocking them. But, if the threat intelligence context states that this IP has been utilized by an advanced persistent threat (APT), such as a foreign nation-state, then this definitely needs more investigation and analysis to see exactly what the IP in question is scanning for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

INFORMATION SHARING

A

Connecting with analysts in other organizations can really help to boost an organization’s security posture, by simply seeing how other organizations manage their security and the tools they use. This insight can help the security team make informed decisions based on experience from intelligence-sharing partners. It can also help the organization to better defend itself, by receiving early warning signs such as precursors and indicators of compromise, so proactive defensive measures can take place, stopping an attack before it has already begun. We will cover how information can be shared, and in what formats, in the lesson TI5) Strategic Threat Intelligence, IOC/TTP Distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly