Lecture 4 Flashcards
(59 cards)
What is a key risk indicator (KRI)?
Metrics of the upper and lower bounds of specific indicators of normal network activity
What might a KRI exceeding its normal bounds indicate?
A compromise or indicator of compromise IOC
What does IOC stand for in cybersecurity?
Indicator of compromise
What does an IOC show?
Malicious activity is occurring in early stages of an attack
What is the purpose of IOC information?
To aid predictive analysis or discover attacks before they occur
What are the two main categories of threat intelligence sources?
Open source and closed source
What does OSINT stand for?
Open source intelligence
What is CISCP?
Cyber Information Sharing and Collaboration Program that enables unclassified information exchange through partnerships
Name two services CISCP provides.
Analyst to analyst technical exchanges and digital malware analysis
What are two concerns about public information-sharing centres?
Privacy and speed
What is AIS in cybersecurity threat sharing?
Automated Indicator Sharing for cyber threat indicators exchange via computers
Name the two tools that facilitate AIS.
STIX and TAXII
What does STIX stand for?
Structured Threat Information Expression
What does TAXII stand for?
Trusted Automated Exchange of Intelligence Information
What is closed source information?
Proprietary threat intelligence shared in private restricted centres
What is required to participate in closed source threat sharing centres?
Vetting process and meeting certain criteria
What is a vulnerability database?
Repository of known vulnerabilities and exploitation information
What are threat maps?
Cyber threats shown on a geographic diagram
What is the purpose of file and code repositories in threat intelligence?
Where victims upload malicious files and code for analysis by others
What is the dark web?
A small portion of the deep web accessed using special software often linked with illegal activities
What is the clear web?
The internet accessible via standard browsers indexed by search engines
What is the deep web?
Parts of the internet not indexed by search engines including private or paywall content
What software is commonly used to access the dark web?
Tor browser