Podcast
Questions and Answers
Which organization maintains a list of CVEs used by prominent security organizations?
Which organization maintains a list of CVEs used by prominent security organizations?
- (ISC)2
- SANS Institute
- SecurityNews
- FIRST (correct)
What type of resources does the SANS Institute provide for free upon request?
What type of resources does the SANS Institute provide for free upon request?
- Training Programs
- Security News Alerts
- Research Papers
- Early Warning Systems (correct)
Which of the following services is provided by the organization (ISC)2?
Which of the following services is provided by the organization (ISC)2?
- Active vulnerability exploits
- Vendor neutral education products (correct)
- Network attack vectors
- Daily security news updates
What is the primary focus of FIRST as a security organization?
What is the primary focus of FIRST as a security organization?
Which weekly digest from SANS focuses specifically on newly discovered attack vectors?
Which weekly digest from SANS focuses specifically on newly discovered attack vectors?
Which organization aggregates the latest information related to alerts, exploits, and vulnerabilities?
Which organization aggregates the latest information related to alerts, exploits, and vulnerabilities?
What is one of the primary functions of the SANS Reading Room?
What is one of the primary functions of the SANS Reading Room?
Which of the following best describes the target audience for (ISC)2's education products?
Which of the following best describes the target audience for (ISC)2's education products?
Which of the following resources is NOT mentioned as useful for staying updated on cybersecurity threats?
Which of the following resources is NOT mentioned as useful for staying updated on cybersecurity threats?
What approach does FireEye use to secure networks?
What approach does FireEye use to secure networks?
Which organization is responsible for creating the Common Vulnerabilities and Exposure (CVE) catalog?
Which organization is responsible for creating the Common Vulnerabilities and Exposure (CVE) catalog?
What is the primary purpose of the Automated Indicator Sharing (AIS) service?
What is the primary purpose of the Automated Indicator Sharing (AIS) service?
Which of the following is NOT one of the three common threat intelligence sharing standards?
Which of the following is NOT one of the three common threat intelligence sharing standards?
What is the primary purpose of the MS-ISAC in relation to cyber threats?
What is the primary purpose of the MS-ISAC in relation to cyber threats?
Which of the following is NOT mentioned as a method for network security professionals to stay updated on the latest threats?
Which of the following is NOT mentioned as a method for network security professionals to stay updated on the latest threats?
What do the Cisco Annual Cybersecurity Report and the Mid-Year Cybersecurity Report provide information about?
What do the Cisco Annual Cybersecurity Report and the Mid-Year Cybersecurity Report provide information about?
Continuous professional development for network security professionals includes which of the following?
Continuous professional development for network security professionals includes which of the following?
What is a consequence of the steep learning curve in network security?
What is a consequence of the steep learning curve in network security?
What types of resources do blogs and podcasts primarily provide to security professionals?
What types of resources do blogs and podcasts primarily provide to security professionals?
Which aspect is crucial for a cybersecurity analyst when reading security reports?
Which aspect is crucial for a cybersecurity analyst when reading security reports?
Which of the following is NOT a role of the CIS in relation to cyber threats?
Which of the following is NOT a role of the CIS in relation to cyber threats?
Which service is known for regularly creating and distributing firewall rules and indicators of compromise (IOCs)?
Which service is known for regularly creating and distributing firewall rules and indicators of compromise (IOCs)?
What is the primary objective of the Cisco Talos Threat Intelligence Group?
What is the primary objective of the Cisco Talos Threat Intelligence Group?
How many podcasts does Cisco Talos offer that cover security-related topics?
How many podcasts does Cisco Talos offer that cover security-related topics?
In the context of threat intelligence services, what does the abbreviation IOC stand for?
In the context of threat intelligence services, what does the abbreviation IOC stand for?
What type of information is primarily shared through threat intelligence services?
What type of information is primarily shared through threat intelligence services?
What is a notable feature of Cisco security blogs?
What is a notable feature of Cisco security blogs?
Which of the following best describes the team composition of the Cisco Talos group?
Which of the following best describes the team composition of the Cisco Talos group?
What is the intended outcome of Cisco Talos's data collection on threats?
What is the intended outcome of Cisco Talos's data collection on threats?
What are the three major types of threat intelligence data?
What are the three major types of threat intelligence data?
What is the primary purpose of a threat intelligence platform (TIP)?
What is the primary purpose of a threat intelligence platform (TIP)?
How can organizations enhance their threat intelligence?
How can organizations enhance their threat intelligence?
What is the role of honeypots in threat intelligence?
What is the role of honeypots in threat intelligence?
What risk is associated with hosting honeypots?
What risk is associated with hosting honeypots?
Which organization is NOT mentioned as a provider of network intelligence?
Which organization is NOT mentioned as a provider of network intelligence?
What is one benefit of basing a honeypot in the cloud?
What is one benefit of basing a honeypot in the cloud?
Which of the following is NOT a type of threat intelligence data?
Which of the following is NOT a type of threat intelligence data?
What is the primary function of Automated Indicator Sharing (AIS)?
What is the primary function of Automated Indicator Sharing (AIS)?
Which of the following best describes the capabilities of the FireEye Helix Security Platform?
Which of the following best describes the capabilities of the FireEye Helix Security Platform?
How does FireEye's security system enhance malware detection?
How does FireEye's security system enhance malware detection?
What is the purpose of the Common Vulnerabilities and Exposures (CVE) database?
What is the purpose of the Common Vulnerabilities and Exposures (CVE) database?
Which organization is responsible for sponsoring the creation of the CVE database?
Which organization is responsible for sponsoring the creation of the CVE database?
What kind of technology does the Cisco Security product utilize?
What kind of technology does the Cisco Security product utilize?
What distinguishes the method FireEye uses to detect zero-day threats?
What distinguishes the method FireEye uses to detect zero-day threats?
Which of the following tools does Cisco maintain security incident detection rule sets for?
Which of the following tools does Cisco maintain security incident detection rule sets for?
Flashcards
CIS Role
CIS Role
A focal point for cyber threat prevention, protection, response, and recovery for local governments.
Cyber Threat Prevention
Cyber Threat Prevention
Measures to stop cyberattacks before they happen.
Cyber Threat Protection
Cyber Threat Protection
Measures to defend against cyberattacks.
Cyber Threat Response
Cyber Threat Response
Signup and view all the flashcards
Cyber Threat Recovery
Cyber Threat Recovery
Signup and view all the flashcards
Continuous Skill Improvement
Continuous Skill Improvement
Signup and view all the flashcards
Security Professionals
Security Professionals
Signup and view all the flashcards
Cybersecurity Reports
Cybersecurity Reports
Signup and view all the flashcards
SANS Institute Resources
SANS Institute Resources
Signup and view all the flashcards
Internet Storm Center
Internet Storm Center
Signup and view all the flashcards
CVE List (Mitre)
CVE List (Mitre)
Signup and view all the flashcards
FIRST (Forum of Incident Response and Security Teams)
FIRST (Forum of Incident Response and Security Teams)
Signup and view all the flashcards
Security News Portal
Security News Portal
Signup and view all the flashcards
Wire (ISC)²
Wire (ISC)²
Signup and view all the flashcards
Network Intelligence Communities
Network Intelligence Communities
Signup and view all the flashcards
Threat Intelligence Services
Threat Intelligence Services
Signup and view all the flashcards
Cybersecurity Intelligence Reports
Cybersecurity Intelligence Reports
Signup and view all the flashcards
Indicators of Compromise (IOCs)
Indicators of Compromise (IOCs)
Signup and view all the flashcards
Cisco Talos Threat Intelligence Group
Cisco Talos Threat Intelligence Group
Signup and view all the flashcards
Security Blogs
Security Blogs
Signup and view all the flashcards
Cisco Talos Security Podcasts
Cisco Talos Security Podcasts
Signup and view all the flashcards
Vulnerabilities
Vulnerabilities
Signup and view all the flashcards
Mitigation Techniques
Mitigation Techniques
Signup and view all the flashcards
Threat Intelligence
Threat Intelligence
Signup and view all the flashcards
Cisco Talos
Cisco Talos
Signup and view all the flashcards
FireEye's Approach
FireEye's Approach
Signup and view all the flashcards
Automated Indicator Sharing (AIS)
Automated Indicator Sharing (AIS)
Signup and view all the flashcards
CVE Catalog
CVE Catalog
Signup and view all the flashcards
Threat Intelligence Platforms (TIPs)
Threat Intelligence Platforms (TIPs)
Signup and view all the flashcards
Tools, Techniques, and Procedures (TTPs)
Tools, Techniques, and Procedures (TTPs)
Signup and view all the flashcards
Reputation Information
Reputation Information
Signup and view all the flashcards
Honeypots
Honeypots
Signup and view all the flashcards
Cloud-Based Honeypots
Cloud-Based Honeypots
Signup and view all the flashcards
MITRE ATT&CK Framework
MITRE ATT&CK Framework
Signup and view all the flashcards
Common Vulnerabilities and Exposures (CVEs)
Common Vulnerabilities and Exposures (CVEs)
Signup and view all the flashcards
Snort.org
Snort.org
Signup and view all the flashcards
ClamAV
ClamAV
Signup and view all the flashcards
SpamCop
SpamCop
Signup and view all the flashcards
FireEye Helix
FireEye Helix
Signup and view all the flashcards
Signature-less engine
Signature-less engine
Signup and view all the flashcards
MITRE Corporation
MITRE Corporation
Signup and view all the flashcards
Study Notes
Module 3: Threat Intelligence
- Module objective: Evaluate threat intelligence sources.
Information Sources
- SANS: Resources are largely free upon request, including the Internet Storm Center (early warning), NewsBites (weekly security news digest), @RISK (weekly digest of attack vectors and vulnerabilities), Flash security alerts, and Reading Room (research papers). SANS also develops security courses.
- Mitre: Maintains a list of CVE (Common Vulnerabilities and Exposures).
- FIRST: Security organization bringing together incident response teams from government, commercial, and educational organizations, fostering cooperation in information sharing, prevention, and rapid response.
- SecurityNews: Security news portal aggregating breaking news on alerts, exploits, and vulnerabilities.
- (ISC)² Wire: Provides vendor-neutral education products and career services to over 75,000+ industry professionals in over 135 countries.
- CIS: Focal point for cyber threat prevention, protection, response, and recovery for governments, offering 24/7 cyber threat warnings, vulnerability identification, and mitigation, and incident response services.
Network Intelligence Communities (Cont.)
- To remain effective: Stay updated on the latest threats (subscribe to real-time feeds, security websites, blogs, podcasts), and upgrade skills (attend training, workshops, and conferences).
- Network security has a steep learning curve and requires continuous professional development.
Cisco Cybersecurity Reports
- Resources for staying updated on latest threats: Cisco Annual Cybersecurity Report and Mid-Year Cybersecurity Report.
- These reports provide updates, expert analysis on vulnerabilities, and factors behind attacks using adware and spam.
- Cybersecurity analysts should read these reports to learn about threat actors' targeting methods and mitigation strategies.
Security Blogs and Podcasts
- Another method to keep up-to-date is through reading blogs and listening to podcasts.
- Blogs and podcasts provide advice, research, and recommended mitigation techniques.
- Cisco provides blogs on security-related topics and podcasts from experts and the Cisco Talos Group.
- Search for Cisco security blogs and subscribe for notifications.
- Cisco Talos offers numerous podcasts available for listening or download.
Lab - Evaluate Cybersecurity Reports
- Part 1: Research Cyber Security intelligence Reports
- Part 2: Research Cyber Security Intelligence Based on Industry.
- Part 3: Research Cyber Security Threat Intelligence in Real Time
3.2 Threat Intelligence Services
- Cisco Talos: Exchange threat information (vulnerabilities, indicators of compromise (IOC), and mitigation techniques) with personnel and security systems.
- Create and distribute firewall rules and IOCs to subscribed devices as threats emerge.
- Cisco Talos Threat Intelligence Group is a sample service.
- It is one of the largest commercial threat intelligence teams, comprised of world-class researchers, analysts, and engineers.
- Its goal is protecting enterprise users, data, and infrastructure, collecting information about existing and emerging threats.
- Provides protection against these threats and malware in real time.
- Provides free software, services, resources, and data.
- Maintains security incident detection rule sets for Snort.org, ClamAV, and SpamCop network security tools.
FireEye
- Security company offering services to secure networks using a three-pronged approach (security intelligence, expertise, technology).
- Offers SIEM and SOAR with the Helix Security Platform using behavioral analysis and advanced threat detection, supported by FireEye Mandiant's worldwide threat intelligence network.
- Helix is a cloud-hosted security operations platform combining security tools and threat intelligence.
- Blocks attacks across web and email threat vectors, and latent malware on file shares.
- Blocks advanced malware and compromises most enterprise networks.
- Uses a signature-less engine utilizing stateful attack analysis to detect zero-day threats.
Automated Indicator Sharing
- The U.S. Department of Homeland Security (DHS) offers a free service called Automated Indicator Sharing (AIS).
- Enables real-time exchange of cyber threat indicators (malicious IP addresses, phishing emails) between the U.S. Federal Government and the private sector.
- Creates an ecosystem for immediate threat sharing to protect networks.
Common Vulnerabilities and Exposures (CVE) Database
- The United States government sponsored the MITRE Corporation to create and maintain a catalog called Common Vulnerabilities and Exposures (CVE).
- The CVE serves as a dictionary for known cybersecurity vulnerabilities (by using CVE identifiers).
- The MITRE Corporation defines unique CVE Identifiers to easily share data.
Threat Intelligence Communication Standards
- Network organizations and professionals must share threat information to increase knowledge.
- Several intelligence sharing open standards have evolved to enable communication across networking platforms and automated, consistent, and machine-readable threat intelligence (CTI) exchange.
- Three common threat intelligence sharing standards: Structured Threat Information Expression (STIX), Trusted Automated Exchange of Indicator Information (TAXII), and CybOX.
- STIX is a set of specification for exchange of threat information between organizations, including CybOX standard.
- TAXII is a specification for application layer protocol allowing CTI communication using HTTPS.
- CybOX is a set of standardized schemas for specifying, capturing, and characterizing network operations, supporting many cybersecurity functions.
- The Malware Information Sharing Platform (MISP): Open-source platform for sharing newly discovered threats, indicators of compromise (IOCs).
- Globally supported by the European Union, over 6000 organizations utilize MISP.
- MISP allows automated sharing of IOCs using STIX and other formats.
- These open standards standardize cyber threat intelligence information exchange.
Threat Intelligence Platforms
- Various threat intelligence sources exist, each with unique formats.
- Accessing and using multiple threat intelligence sources can be time-consuming.
- Threat intelligence platforms centralize threat data from various sources, offering formats for analysis.
- Threat intelligence data includes Indicators of Compromise (IOC), Technique, Procedure and Tools(TTPs), and reputation information.
- Threat intelligence platform designs encompass threat intelligence data in a comprehensible and usable format.
Threat Intelligence Platforms (Cont.)
- Organizations can contribute to threat intelligence by sharing intrusion data (typically automated).
- Threat intelligence services use subscriber data to stay up-to-date on threats.
- Honeypots are simulated networks to attract attackers, sharing attack-related information.
- Cloud-based honeypots isolate from production networks, offering an alternative gathering method.
Lab - Identify Relevant Threat Intelligence
- Part 1: Research MITRE CVE
- Part 2: Access MITRE ATT&CK Knowledge Base.
- Part 3: Investigate Potential Malware.
3.3 Threat Intelligence Summary
- Several organizations provide network intelligence (SANS, Mitre, FIRST, SecurityNewsWire, (ISC)² Wire, and CIS).
- Staying up-to-date (keeping abreast of threats, upskilling) and using resources like Cisco's annual reports is important.
- Blogs and podcasts provide updated insights on threat information (vulnerabilities, IOCs, and mitigation techniques).
- Threat intelligence services allow exchange with security systems, creating/distributing firewall rules and Indicators of Compromise (IOCs) to subscribed devices as threats emerge.
- Examples include Cisco Talos Threat Intelligence Group, and other services such as FireEye.
- FireEye uses a three-pronged approach combining security intelligence, expertise and technology.
- The US Department of Homeland Security (DHS) offers Automated Indicator Sharing (AIS) for real-time exchange between the US Federal Government and the private sector.
- The MITRE Corporation maintains the Common Vulnerabilities and Exposures (CVE) catalogue of threats
- Three key standards (STIX, TAXII, and CybOX) standardize cyber threat intelligence information exchange.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz evaluates your understanding of threat intelligence sources, including SANS, Mitre, and FIRST. Test your knowledge on various information sources and their roles in cybersecurity. Enhance your ability to navigate and utilize these resources effectively.