Podcast
Questions and Answers
A campaign is a collection of malicious actor behaviors targeting a common ______ over a finite timeframe.
A campaign is a collection of malicious actor behaviors targeting a common ______ over a finite timeframe.
target
A course of action is a preventative or response action to address an ______.
A course of action is a preventative or response action to address an ______.
attack
An Identity is an SDO representing individuals, organizations, or ______.
An Identity is an SDO representing individuals, organizations, or ______.
groups
Indicators in spear phishing messages often use links with phishing ______, generic form language, or ASCII homographs.
Indicators in spear phishing messages often use links with phishing ______, generic form language, or ASCII homographs.
An intrusion set may comprise multiple campaigns over a long period, even if from the same threat ______.
An intrusion set may comprise multiple campaigns over a long period, even if from the same threat ______.
TAXII defines how threat data is shared among participating ______.
TAXII defines how threat data is shared among participating ______.
TAXII specifies the structure for exchanging information and accompanying ______.
TAXII specifies the structure for exchanging information and accompanying ______.
TAXII 1.0 integrates with existing sharing agreements using three primary ______.
TAXII 1.0 integrates with existing sharing agreements using three primary ______.
In the Hub and Spoke model, a central Hub communicates with multiple ______ nodes.
In the Hub and Spoke model, a central Hub communicates with multiple ______ nodes.
In the Peer-to-Peer model, peers communicate ______ with each other.
In the Peer-to-Peer model, peers communicate ______ with each other.
Accuracy is crucial for decision-making in information __________.
Accuracy is crucial for decision-making in information __________.
Analysts should acknowledge and mitigate __________ by surrounding themselves with diverse perspectives.
Analysts should acknowledge and mitigate __________ by surrounding themselves with diverse perspectives.
The __________ level of confidence is used for assessments based on high-quality information.
The __________ level of confidence is used for assessments based on high-quality information.
Moderate confidence indicates that the information is credibly sourced but not sufficient for a higher level of __________.
Moderate confidence indicates that the information is credibly sourced but not sufficient for a higher level of __________.
Information categorized as __________ is questionable, fragmented, and raises significant concerns about its sources.
Information categorized as __________ is questionable, fragmented, and raises significant concerns about its sources.
Malware is any malicious code or software used to compromise the integrity or availability of a system or its ______.
Malware is any malicious code or software used to compromise the integrity or availability of a system or its ______.
The observed data SDO describes any observable collected from a network or ______ device.
The observed data SDO describes any observable collected from a network or ______ device.
Reports detail security events, including the malware used or the methodologies employed during a ______.
Reports detail security events, including the malware used or the methodologies employed during a ______.
The threat actor SDO identifies individuals or groups responsible for ______ activities.
The threat actor SDO identifies individuals or groups responsible for ______ activities.
The tool SDO describes software used by threat actors during ______.
The tool SDO describes software used by threat actors during ______.
An indicator includes context describing an aspect of an event relating to a specific ______.
An indicator includes context describing an aspect of an event relating to a specific ______.
To transform newly discovered indicators into actionable items, analysts perform ______ to determine if the indicator is valid.
To transform newly discovered indicators into actionable items, analysts perform ______ to determine if the indicator is valid.
The Structured Threat Information Expression (STIX) uses a structure based on twelve Domain Objects (SDOs) and two ______ Objects (SROs).
The Structured Threat Information Expression (STIX) uses a structure based on twelve Domain Objects (SDOs) and two ______ Objects (SROs).
Attack patterns help categorize attacker tactics, techniques, and ______.
Attack patterns help categorize attacker tactics, techniques, and ______.
Sharing threat intelligence with partners benefits everyone by improving detection and prioritizing ______ allocation.
Sharing threat intelligence with partners benefits everyone by improving detection and prioritizing ______ allocation.
A Vulnerability SDO is used to communicate any mistake in software that an attacker can exploit to gain unauthorized access to a _____
A Vulnerability SDO is used to communicate any mistake in software that an attacker can exploit to gain unauthorized access to a _____
Malware objects provide key characteristics about the malicious software and when they are used in an _____
Malware objects provide key characteristics about the malicious software and when they are used in an _____
The Relationship SRO links SDOs together and shows how they work with each _____
The Relationship SRO links SDOs together and shows how they work with each _____
A Sighting SRO provides information about the occurrence of an SDO, such as an indicator or _____
A Sighting SRO provides information about the occurrence of an SDO, such as an indicator or _____
The relationship type 'target' is used to show the relationship between a source SDO and a target _____
The relationship type 'target' is used to show the relationship between a source SDO and a target _____
Signature-based systems are effective against ______ threats.
Signature-based systems are effective against ______ threats.
Anomaly-based systems examine what an executable does, not just what it ______ like.
Anomaly-based systems examine what an executable does, not just what it ______ like.
'Zero day' refers to a vulnerability or exploit in software that is previously ______ to the public.
'Zero day' refers to a vulnerability or exploit in software that is previously ______ to the public.
Anomaly-based systems often use a ______ environment to observe an executable's behavior.
Anomaly-based systems often use a ______ environment to observe an executable's behavior.
A zero-day vulnerability is a flaw in software that the ______ is unaware of.
A zero-day vulnerability is a flaw in software that the ______ is unaware of.
The TAXII server manages the ______ and channels.
The TAXII server manages the ______ and channels.
OpenIOC is designed to organize information about attacker tactics, techniques, and procedures (TTPs) and indicators of ______.
OpenIOC is designed to organize information about attacker tactics, techniques, and procedures (TTPs) and indicators of ______.
The ______ is the client that requests and subscribes to data in the TAXII 2.0 architecture.
The ______ is the client that requests and subscribes to data in the TAXII 2.0 architecture.
OpenIOC comprises three main components: IOC Metadata, References, and ______.
OpenIOC comprises three main components: IOC Metadata, References, and ______.
A ______ in OpenIOC describes how the IOC fits operationally within specific environments.
A ______ in OpenIOC describes how the IOC fits operationally within specific environments.
APTs are identified by the use of stealthy and continuous computer hacking ______.
APTs are identified by the use of stealthy and continuous computer hacking ______.
APT operators often use both digital surveillance and traditional techniques targeting ______.
APT operators often use both digital surveillance and traditional techniques targeting ______.
These campaigns are often orchestrated by military or government ______.
These campaigns are often orchestrated by military or government ______.
APTs reflect a political plan, indicating their nature as a deeper ______ issue.
APTs reflect a political plan, indicating their nature as a deeper ______ issue.
The execution of APT campaigns might be automated, but humans are responsible for their ______.
The execution of APT campaigns might be automated, but humans are responsible for their ______.
Zero-day vulnerabilities create black markets for these ______.
Zero-day vulnerabilities create black markets for these ______.
Security teams need to develop ______ and controls to mitigate impacts from discoveries.
Security teams need to develop ______ and controls to mitigate impacts from discoveries.
Organizations should use a multi-faceted approach to respond to ______ exploits.
Organizations should use a multi-faceted approach to respond to ______ exploits.
The US Pentagon has adopted 'Hack the Pentagon' as part of a ______ program.
The US Pentagon has adopted 'Hack the Pentagon' as part of a ______ program.
Proactive efforts to discover new ______ are essential for organizations.
Proactive efforts to discover new ______ are essential for organizations.
Flashcards
Accuracy in threat intelligence
Accuracy in threat intelligence
Threat intelligence needs accurate information, even if not perfectly understanding the situation.
Analyst bias
Analyst bias
Analysts' personal viewpoints can affect judgments. Diverse teams and structured methods are crucial.
High confidence intelligence
High confidence intelligence
Strong support for the accuracy of the intelligence from information's quality or judgment strength.
Moderate confidence intelligence
Moderate confidence intelligence
Signup and view all the flashcards
Low confidence intelligence
Low confidence intelligence
Signup and view all the flashcards
Indicator
Indicator
Signup and view all the flashcards
Indicator Vetting
Indicator Vetting
Signup and view all the flashcards
Indicator Analysis
Indicator Analysis
Signup and view all the flashcards
STIX
STIX
Signup and view all the flashcards
Attack Pattern
Attack Pattern
Signup and view all the flashcards
Campaign
Campaign
Signup and view all the flashcards
Course of Action
Course of Action
Signup and view all the flashcards
Identity (SDO)
Identity (SDO)
Signup and view all the flashcards
Indicator (SDO)
Indicator (SDO)
Signup and view all the flashcards
Intrusion Set
Intrusion Set
Signup and view all the flashcards
Malware definition
Malware definition
Signup and view all the flashcards
Observed Data
Observed Data
Signup and view all the flashcards
Threat Actor
Threat Actor
Signup and view all the flashcards
Security Report
Security Report
Signup and view all the flashcards
Tool (SDO)
Tool (SDO)
Signup and view all the flashcards
TAXII
TAXII
Signup and view all the flashcards
Hub and Spoke Model
Hub and Spoke Model
Signup and view all the flashcards
Source/Subscriber Model
Source/Subscriber Model
Signup and view all the flashcards
Peer-to-Peer Model
Peer-to-Peer Model
Signup and view all the flashcards
What are the 3 main TAXII models?
What are the 3 main TAXII models?
Signup and view all the flashcards
Vulnerability SDO
Vulnerability SDO
Signup and view all the flashcards
Malware Object
Malware Object
Signup and view all the flashcards
Relationship SRO
Relationship SRO
Signup and view all the flashcards
Sighting SRO
Sighting SRO
Signup and view all the flashcards
Target Relationship
Target Relationship
Signup and view all the flashcards
Zero-day exploit
Zero-day exploit
Signup and view all the flashcards
Exploit marketplace
Exploit marketplace
Signup and view all the flashcards
Bug bounty programs
Bug bounty programs
Signup and view all the flashcards
SANS Internet Storm Center
SANS Internet Storm Center
Signup and view all the flashcards
Proactive threat discovery
Proactive threat discovery
Signup and view all the flashcards
TAXII 2.0 Collections
TAXII 2.0 Collections
Signup and view all the flashcards
TAXII 2.0 Channels
TAXII 2.0 Channels
Signup and view all the flashcards
OpenIOC Framework
OpenIOC Framework
Signup and view all the flashcards
What is OpenIOC Metadata?
What is OpenIOC Metadata?
Signup and view all the flashcards
What are OpenIOC References?
What are OpenIOC References?
Signup and view all the flashcards
Signature-based detection
Signature-based detection
Signup and view all the flashcards
Anomaly-based detection
Anomaly-based detection
Signup and view all the flashcards
Zero-day vulnerability
Zero-day vulnerability
Signup and view all the flashcards
Sandbox
Sandbox
Signup and view all the flashcards
What is the difference between signature-based and anomaly-based detection?
What is the difference between signature-based and anomaly-based detection?
Signup and view all the flashcards
What is an APT?
What is an APT?
Signup and view all the flashcards
What makes APTs 'advanced'?
What makes APTs 'advanced'?
Signup and view all the flashcards
What makes APTs 'persistent'?
What makes APTs 'persistent'?
Signup and view all the flashcards
What makes APTs a 'threat'?
What makes APTs a 'threat'?
Signup and view all the flashcards
Why are APTs difficult to detect?
Why are APTs difficult to detect?
Signup and view all the flashcards