Cyber Threat Intelligence Flashcards

(35 cards)

1
Q

What is Cyber Threat Intelligence (CTI)?

A

Evidence-based knowledge about adversaries, including their indicators, tactics, motivations, and actionable advice against them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three terms often used interchangeably in CTI?

A

Data, Information, Intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Data in the context of CTI.

A

Discrete indicators associated with an adversary, such as IP addresses, URLs or hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Information in the context of CTI.

A

A combination of multiple data points that answer specific questions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Intelligence in the context of CTI.

A

The correlation of data and information to extract patterns of actions based on contextual analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary goal of CTI?

A

To understand the relationship between your operational environment and your adversary and how to defend against attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of questions should CTI aim to answer?

A

Who’s attacking you? What are their motivations? What are their capabilities? What artefacts and indicators of compromise (IOCs) should you look out for?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the internal sources of threat intelligence?

A
  • Corporate security events
  • Cyber awareness training reports
  • System logs and events
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the community sources of threat intelligence?

A
  • Open web forums
  • Dark web communities for cybercriminals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the external sources of threat intelligence?

A
  • Threat intel feeds (Commercial & Open-source)
  • Online marketplaces
  • Public sources including government data, publications, social media, financial and industrial assessments.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the classifications of Threat Intelligence?

A
  • Strategic Intel
  • Technical Intel
  • Tactical Intel
  • Operational Intel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Strategic Intel focus on?

A

High-level intel that looks into the organisation’s threat landscape and maps out risk areas based on trends and emerging threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does Technical Intel focus on?

A

Evidence and artefacts of attacks used by adversaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does Tactical Intel assess?

A

Adversaries’ tactics, techniques, and procedures (TTPs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Operational Intel look into?

A

An adversary’s specific motives and intent to perform an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the first phase of the CTI lifecycle?

17
Q

What is the purpose of the Direction phase in the CTI lifecycle?

A

To define objectives and goals, identify information assets and business processes that require defending.

18
Q

What does the Collection phase involve?

A

Gathering required data to address defined objectives.

19
Q

What is the goal of the Processing phase in the CTI lifecycle?

A

To ensure data is extracted, sorted, organised, correlated, and presented in a usable format.

20
Q

What is the outcome of the Analysis phase?

A

Deriving insights and making decisions about potential threats.

21
Q

What is the dissemination phase of the CTI lifecycle?

A

The phase where intelligence is communicated to various organizational stakeholders.

22
Q

What is the Feedback phase in the CTI lifecycle?

A

The phase where analysts rely on stakeholder responses to improve the threat intelligence process.

23
Q

What is the MITRE ATT&CK framework?

A

A knowledge base of adversary behaviour focusing on indicators and tactics.

24
Q

What does TAXII stand for?

A

Trusted Automated eXchange of Indicator Information.

25
What are the two sharing models supported by TAXII?
* Collection * Channel
26
What is STIX?
Structured Threat Information Expression, a language for specifying and communicating standardized cyber threat information.
27
What is the purpose of the Cyber Kill Chain?
To break down adversary actions into steps to help analysts identify specific activities during an investigation.
28
What is the first phase of the Cyber Kill Chain?
Reconnaissance.
29
What does the Installation phase of the Cyber Kill Chain involve?
Installing malware and other tools to gain access to the victim's system.
30
What does the Command & Control phase involve?
Remotely controlling the compromised system and delivering additional malware.
31
What does the Diamond Model focus on?
Intrusion analysis and tracking attack groups over time through four key areas: Adversary, Victim, Infrastructure, and Capabilities.
32
Fill in the blank: The _______ model looks at intrusion analysis and tracking attack groups.
Diamond
33
True or False: The diamond model includes the victim's systems as part of its analysis.
True
34
What is the purpose of threat reports in the dissemination phase?
To consolidate information presented to all suitable stakeholders.
35
Name one company that produces notable threat reports.
* Mandiant * Recorded Future * Palo Alto Unit42