Podcast
Questions and Answers
What is the first step to stopping a threat?
What is the first step to stopping a threat?
- Researching potential threats
- Implementing security measures
- Collecting research information
- Understanding the threat exists (correct)
Why do you need to collect research information from many different resources?
Why do you need to collect research information from many different resources?
- To identify the methods of attackers
- To know the vendors of the operating systems
- To understand the scope of the threats (correct)
- Because each resource provides a complete understanding of the threats
Where should you start when researching threats associated with an operating system or application?
Where should you start when researching threats associated with an operating system or application?
- Online forums and discussion boards
- The companies that wrote the operating system or application (correct)
- The National Institute of Standards and Technology
- Independent security research organizations
What is the National Vulnerability Database?
What is the National Vulnerability Database?
What is the purpose of a vendor's notification process?
What is the purpose of a vendor's notification process?
What does CVE stand for?
What does CVE stand for?
What can be a valuable tool for gathering information on Twitter?
What can be a valuable tool for gathering information on Twitter?
Why is it important to have an automated threat feed?
Why is it important to have an automated threat feed?
What is a TTP in the context of security threats?
What is a TTP in the context of security threats?
Why is it important to know where an attacker likes to focus their efforts?
Why is it important to know where an attacker likes to focus their efforts?
What can be used to monitor how malware is operating on a network?
What can be used to monitor how malware is operating on a network?
What is the benefit of understanding an attacker's TTP?
What is the benefit of understanding an attacker's TTP?
What is a common practice to supplement a vulnerability database?
What is a common practice to supplement a vulnerability database?
What can be learned from conferences?
What can be learned from conferences?
What type of information can be found in academic journals?
What type of information can be found in academic journals?
What are RFCs used for?
What are RFCs used for?
What can be learned from reading RFCs?
What can be learned from reading RFCs?
What is the purpose of a user group meeting?
What is the purpose of a user group meeting?
What type of information can be found on social media?
What type of information can be found on social media?
What is the benefit of attending conferences?
What is the benefit of attending conferences?
What is the purpose of a central vulnerability management system?
What is the purpose of a central vulnerability management system?
Why are academic journals useful?
Why are academic journals useful?
What is the primary reason why an IT professional needs to continuously research threats?
What is the primary reason why an IT professional needs to continuously research threats?
Where can you find comprehensive information about vulnerabilities in an operating system or application?
Where can you find comprehensive information about vulnerabilities in an operating system or application?
What is the primary purpose of a vendor's notification process?
What is the primary purpose of a vendor's notification process?
Why is it important to collect research information from multiple sources?
Why is it important to collect research information from multiple sources?
What is the National Vulnerability Database used for?
What is the National Vulnerability Database used for?
What is the benefit of understanding how an attacker gets into one network?
What is the benefit of understanding how an attacker gets into one network?
What is the primary benefit of using Twitter for threat intelligence?
What is the primary benefit of using Twitter for threat intelligence?
What type of information is often provided by automated threat feeds?
What type of information is often provided by automated threat feeds?
Why is it important to understand an attacker's TTP?
Why is it important to understand an attacker's TTP?
What is a common challenge with understanding attacker TTPs?
What is a common challenge with understanding attacker TTPs?
Why is it useful to know where an attacker likes to focus their efforts?
Why is it useful to know where an attacker likes to focus their efforts?
What type of resources can provide automated threat feeds?
What type of resources can provide automated threat feeds?
What is the primary purpose of a central vulnerability management system?
What is the primary purpose of a central vulnerability management system?
What can be learned from researchers presenting at conferences?
What can be learned from researchers presenting at conferences?
Why are academic journals useful for security professionals?
Why are academic journals useful for security professionals?
What is a common source of information for security professionals?
What is a common source of information for security professionals?
What can be found in RFCs?
What can be found in RFCs?
What is the benefit of attending user group meetings?
What is the benefit of attending user group meetings?
What type of information can be found in user groups that are not specific to IT security?
What type of information can be found in user groups that are not specific to IT security?
What can be learned from reading about a deep dive into a type of malware?
What can be learned from reading about a deep dive into a type of malware?
Why is it important to supplement a vulnerability database?
Why is it important to supplement a vulnerability database?
What is the purpose of conferences for security professionals?
What is the purpose of conferences for security professionals?