1B. Importance of Threat Data and Intelligence obj 1.1, 1.2 Flashcards

1
Q

What is Security Intelligence?

A

Security intelligence focuses on your systems (firewall logs, IDS alerts, etc) . It is the act of collecting, normalising, and analysing data generated by IT infrastructure in real-time, and using the information to assess and improve an organisation’s security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Cyber Threat Intelligence (CTI)?

A

CTI provides data about the external threat landscape and emerging threats (e.g., hacker groups, malware outbreaks, zero-days, etc).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the Two formats of CTI reports?

A

1) Narrative
- written document that must be assimilated manually. Useful for strategic intelligence.
2) Data feeds
- Lists of IoCs (domain names, IPs, hashes of exploit code, etc). Useful for use in automated systems to inform real-time decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what do threat feeds provide?

A

up-to-date details about threats, such as IP addresses, hostnames/domains, emails, URLs, file hashes/paths, CVE numbers, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the five stages of the security Intelligence Gathering life cycle?

A

1) Requirements
2) Collection
3) Analysis
4) Dissemination
5) Feedback

(Ryan Cooked A Delicious Feast)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Briefly explain the first phase of the security intelligence gathering life cycle

A

Requirements Gathering (e.g., types of threats you’re most likely to face, identify specific sources that will be used to gather the required information, identifying laws/regs you must adhere to, etc). This phase includes:

1) assessing security breaches you have faced,

2) assess what information could have prevented/limited to impact of the breach,

3) assess what security controls were not in place that could have mitigated the breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Briefly explain the second phase of the security intelligence gathering life cycle

A

Collection. Once the information requirements have been identified, you can begin collecting from Threat Intelligence sources to meet those requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Briefly explain the third phase of the security intelligence gathering life cycle

A

Analysis and Processing. Data must be formatted so that it can be consumed by whatever tools or processes you intend to use. You must then analyse the data yourself. The output of this stage may then be fed into automated systems, or written reports for seniors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Briefly explain the fourth phase of the security intelligence gathering life cycle

A

Dissemination (sharing is caring). The information is distributed to leadership, IT personnel, and other stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Briefly explain the fifth phase of the security intelligence gathering life cycle

A

Feedback. Gathering feedback about the report and data you have gathered to create better requirements and improve the output of the security intelligence program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What four points should threat intelligence be assessed against? (TRAC)

A

1) Timeliness. If feed is delayed, could miss a threat or react after a threat is no longer relevant.
2) Accuracy. Is the intelligence valid and true? is the intelligence general or of a specific nature? are the sources reliable?
3) Relevancy. Is it relevant to your systems, platforms, and software. If not, then it is obsolete.
4) Confidence score. Threat intelligence sources are given a confidence score which can be used as filter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name some examples of open-source threat intelligence

A

Alien Vault, US-Cert. Threatfeeds.io, VirusTotal, NCSC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ISACs?

A

Information Sharing and Analysis Centres.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are ISACs?

A

A non-profit group that facilitates the sharing of threat intelligence for industry specific threats and security best practices e.g., healthcare, government, finance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the context of the fourth phase of the threat intelligence life cycle, what is Risk Management?

A

Identifying, evaluating, and prioritising threats/vulns to reduce their impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In the context of the fourth phase of the threat intelligence life cycle, what is Incident Response?

A

A protocol for addressing and managing the aftermath of a security breach or attack

17
Q

In the context of the fourth phase of the threat intelligence life cycle, what is Vulnerability Management?

A

Practice of identifying, classifying, prioritising, remediating, and mitigating vulnerabilities

18
Q

In the context of the fourth phase of the threat intelligence life cycle, what is Detection and Monitoring?

A

Practice of observing activity to identify anomalous patterns for further analysis. Fine tuning defences to avoid false-positives/false-negatives.

19
Q

What is Reputational Threat research?

A

The act of identifying threat actors based upon IP addresses, emails, domains, etc, that were previously used in attacks

20
Q

What is Behavioural Threat Research?

A

identifying threat actors based upon the similarities of their behaviour to past attackers