Threat Intelligence Flashcards

1
Q

What are the different classifications of Threat Intelligence?

A
  • Strategic Intel
    • high-level intel that looks into the organisation’s threat landscape and maps out the risk areas based on trends, patterns and emerging threats that may impact business decisions
  • Technical Intel
    • examines evidence and artefacts of attacks an adversary uses
    • create a baseline attack surface to analyse and develop defence mechanisms
  • Tactical Intel
    • assesses adversaries’ tactics, techniques, and procedures (TTPs)
  • Operational Intel
    • assesses an adversary’s specific motives and intent to perform an attack
    • use this intel to understand the critical assets available in the organisation (people, processes, and technologies) that threat actors may target
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which intel classification is known as IOC-based Threat Intelligence?

A

Technical Intel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How would you compare Threat Intelligence Producers and Threat Intelligence Consumers?

A
  • Producers: gather, analyse and disseminate threat intelligence data for others and themselves
  • Consumers: consume Threat Intelligence created by Producers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the IOCs that are commonly distinguised in Threat Intelligence feeds?

A
  • Domains
    • typically attributed to URLs used to host malicious files, C2 callbacks or email domains used for spam
  • IP Addresses
    • commonly attributed to addresses known to execute attacks seen from external assets or outbound callbacks from malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some of the steps conducted in Intelligence-Driven Prevention?

A
  • IP/Domain Blocking via Firewall
  • Domain Blocking through Email Gateways
  • Domain Blocking through DNS Sinkhole
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What acronym is commonly used for Threat Intelligence?

A

CTI (Cyber Threat Intelligence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary goal of CTI?

A

understand the relationship between your operational environment and your adversary and how to defend your environment against any attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To be able to understand the relationship between your operational environment and your adversary and how to defend your environment against any attacks, what questions should be asked?

A
  • Who’s attacking you?
  • What are their motivations?
  • What are their capabilities?
  • What artefacts and indicators of compromise (IOCs) should you look out for?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the categories of different sources from which threat intelligence is gathered?

A
  • Internal
    • corporate security events, vulnerability assessments and incident response reports
  • Community
    • open web forums & dark web communities for cybercriminals
  • External
    • threat intel feeds (Commercial & Open-source)
    • government data, publications, social media, financial and industrial assessments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the CTI lifecycle?

A
  • Direction
    • every threat intel program requires to have objectives and goals defined
  • Collection
    • security analysts will gather the required data to address them
  • Processing
    • data is extracted, sorted, organised, correlated with appropriate tags and presented visually in a usable and understandable format to the analysts
  • Analysis
    • once the information aggregation is complete, security analysts must derive insights
  • Dissemination
    • different organisational stakeholders will consume the intelligence in varying languages and formats
  • Feedback
    • analysts rely on the responses provided by stakeholders to improve the threat intelligence process and implementation of security controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of Trusted Automated eXchange of Indicator Information (TAXII)?

A
  • facilitate automated sharing of information about security threats in a standardized format, enhancing the ability of organizations and security systems to detect and respond to cyber threats
  • define protocols for securely exchanging threat intel to have near real-time detection, prevention and mitigation of threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two sharing models supported by Trusted Automated eXchange of Indicator Information (TAXII)?

A
  • Collection
    • threat intel is collected and hosted by a producer upon request by users using a request-response model
  • Channel
    • threat intel is pushed to users from a central server through a publish-subscribe model
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Structured Threat Information Expression (STIX)?

A

language developed for the “specification, capture, characterisation and communication of standardised cyber threat information”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Threat Intelligence?

A

collection of data about existing or emerging threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Threat Intelligence include?

A

information about malicious IPs, domains, file hashes, tactics, techniques, and procedures (TTPs) of threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly