Threat Intelligence services Flashcards

1
Q

Threat Intelligence Services

A

Threat intelligence services allow the exchange of threat information such as vulnerabilities, indicators of compromise (IOC), and mitigation techniques. This information is not only shared with personnel, but also with security systems. As threats emerge, threat intelligence services create and distribute firewall rules and IOCs to the devices that have subscribed to the service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cisco Talos

A

Talos is one of the largest commercial threat intelligence teams in the world that help protect enterprise users, data, and infrastructure from active adversaries.
The Talos team collects information about active, existing, and emerging threats. Talos then provides comprehensive protection against these attacks and malware to its subscribers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FireEye

A

FireEye uses a three-pronged approach combining security intelligence, security expertise, and technology.
FireEye offers SIEM and SOAR with the Helix Security Platform, which uses behavioral analysis and advanced threat detection and is supported by the FireEye Mandiant worldwide threat intelligence network.

attacks across web and email threat vectors, and latent malware that resides on file shares. It can block advanced malware that easily bypasses traditional signature-based defenses and compromises the majority of enterprise networks. It addresses all stages of an attack lifecycle with a signature-less engine utilizing stateful attack analysis to detect zero-day threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DHS

A

Department of Homeland Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AIS

A

Automated Indicator Sharing
AIS creates an ecosystem where, as soon as a threat is recognized, it is immediately shared with the community to help them protect their networks from that particular threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CVE

A

Common Vulnerabilities Exposures
The CVE serves as a dictionary of common names (i.e., CVE Identifiers) for publicly known cybersecurity vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CTI

A

Cyber Threat Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

STIX

A

Structured Threat Information Expression (STIX) - This is a set of specifications for exchanging cyber threat information between organizations. The Cyber Observable Expression (CybOX) standard has been incorporated into STIX.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TAXII

A

Trusted Automated Exchange of Indicator Information (TAXII) – This is the specification for an application layer protocol that allows the communication of CTI over HTTPS. TAXII is designed to support STIX.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CybOx

A

This is a set of standardized schema for specifying, capturing, characterizing, and communicating events and properties of network operations that supports many cybersecurity functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly