1.5 different threat actors, vectors, and intelligence sources Flashcards

1
Q

APT

A

Advanced Persistent Threat
attackers in the network and undetected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack Vectors

A

method or path that a hacker uses to gain access
* direct physical attack
* wireless
* email
* supply chain
* social media
* removable media
* cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OSINT

A

Open-source intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AIS

A

Automated Indicator Sharing

a free service from the Department of Homeland Security (DHS).

It allows public and private organizations to exchange cyber threat indicators and defensive measures in real time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IOC

A

Indicator of Compromise
forensic data that indicate a potential threat or an attack has occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RFC

A

Request for Comments
formal document that contains specifications and organizational notes about topics related to the internet and computer networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TTP

A

Adversary tactics, techniques,
and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

STIX

A

Structured Threat Information eXpression

a standardized language for sharing and storing cyber threat information

led by DHS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TAXII

A

Trusted Automated eXchange of Intelligence Information

a collection of services and message exchanges to enable the sharing of information about cyber threats across product, service and organizational boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly