Podcast
Questions and Answers
What is the primary role of the MS-ISAC in the context of cybersecurity?
What is the primary role of the MS-ISAC in the context of cybersecurity?
Which of the following is NOT suggested for network security professionals to stay effective?
Which of the following is NOT suggested for network security professionals to stay effective?
What is the primary goal of the Cisco Talos Threat Intelligence Group?
What is the primary goal of the Cisco Talos Threat Intelligence Group?
What type of information do the Cisco Annual and Mid-Year Cybersecurity Reports provide?
What type of information do the Cisco Annual and Mid-Year Cybersecurity Reports provide?
Signup and view all the answers
Which of these is emphasized as a method for cybersecurity analysts to mitigate attacks?
Which of these is emphasized as a method for cybersecurity analysts to mitigate attacks?
Signup and view all the answers
Which service does Cisco Talos provide to help mitigate emerging threats?
Which service does Cisco Talos provide to help mitigate emerging threats?
Signup and view all the answers
How can cybersecurity analysts stay updated with the latest vulnerabilities and exploits?
How can cybersecurity analysts stay updated with the latest vulnerabilities and exploits?
Signup and view all the answers
Why is continuous professional development crucial for network security professionals?
Why is continuous professional development crucial for network security professionals?
Signup and view all the answers
What is included in the information that threat intelligence services share?
What is included in the information that threat intelligence services share?
Signup and view all the answers
Which of the following statements about security blogs and podcasts is true?
Which of the following statements about security blogs and podcasts is true?
Signup and view all the answers
What are the implications of a steep learning curve in network security?
What are the implications of a steep learning curve in network security?
Signup and view all the answers
Which of the following is NOT a focus of the Cisco Talos team?
Which of the following is NOT a focus of the Cisco Talos team?
Signup and view all the answers
What type of content does Cisco Talos offer to subscribers?
What type of content does Cisco Talos offer to subscribers?
Signup and view all the answers
How does subscribing to real-time feeds benefit network security professionals?
How does subscribing to real-time feeds benefit network security professionals?
Signup and view all the answers
What action do threat intelligence services take as threats emerge?
What action do threat intelligence services take as threats emerge?
Signup and view all the answers
Which statement about the Cisco Talos group is accurate?
Which statement about the Cisco Talos group is accurate?
Signup and view all the answers
What is the purpose of threat intelligence services?
What is the purpose of threat intelligence services?
Signup and view all the answers
Which organization offers the free Automated Indicator Sharing (AIS) service?
Which organization offers the free Automated Indicator Sharing (AIS) service?
Signup and view all the answers
What is the Common Vulnerabilities and Exposure (CVE) catalog used for?
What is the Common Vulnerabilities and Exposure (CVE) catalog used for?
Signup and view all the answers
What is one of the services provided by FireEye for network security?
What is one of the services provided by FireEye for network security?
Signup and view all the answers
Which of the following is NOT a common standard for threat intelligence sharing?
Which of the following is NOT a common standard for threat intelligence sharing?
Signup and view all the answers
What is the primary function of the Cisco Security products mentioned?
What is the primary function of the Cisco Security products mentioned?
Signup and view all the answers
Which platforms maintain security incident detection rules for network security tools?
Which platforms maintain security incident detection rules for network security tools?
Signup and view all the answers
What is a feature of the Helix Security Platform offered by FireEye?
What is a feature of the Helix Security Platform offered by FireEye?
Signup and view all the answers
What does the Automated Indicator Sharing (AIS) service enable?
What does the Automated Indicator Sharing (AIS) service enable?
Signup and view all the answers
How does the FireEye Security System enhance protection against advanced malware?
How does the FireEye Security System enhance protection against advanced malware?
Signup and view all the answers
Who is responsible for the creation and maintenance of the Common Vulnerabilities and Exposures (CVE) Database?
Who is responsible for the creation and maintenance of the Common Vulnerabilities and Exposures (CVE) Database?
Signup and view all the answers
What approach does FireEye use to help enterprises secure their networks?
What approach does FireEye use to help enterprises secure their networks?
Signup and view all the answers
What type of threats does the U.S. Department of Homeland Security's AIS primarily target?
What type of threats does the U.S. Department of Homeland Security's AIS primarily target?
Signup and view all the answers
What is the primary purpose of CVE Identifiers?
What is the primary purpose of CVE Identifiers?
Signup and view all the answers
Which standard is specifically designed to facilitate the communication of cyber threat intelligence over HTTPS?
Which standard is specifically designed to facilitate the communication of cyber threat intelligence over HTTPS?
Signup and view all the answers
What does the Malware Information Sharing Platform (MISP) primarily focus on?
What does the Malware Information Sharing Platform (MISP) primarily focus on?
Signup and view all the answers
Which of the following is NOT one of the three common threat intelligence sharing standards mentioned?
Which of the following is NOT one of the three common threat intelligence sharing standards mentioned?
Signup and view all the answers
How many organizations globally use the Malware Information Sharing Platform (MISP)?
How many organizations globally use the Malware Information Sharing Platform (MISP)?
Signup and view all the answers
Which component of the cybersecurity ecosystem is focused on specifying and capturing events for communication?
Which component of the cybersecurity ecosystem is focused on specifying and capturing events for communication?
Signup and view all the answers
What is one of the key features of open standards in threat intelligence communication?
What is one of the key features of open standards in threat intelligence communication?
Signup and view all the answers
Which organization supports the Malware Information Sharing Platform (MISP)?
Which organization supports the Malware Information Sharing Platform (MISP)?
Signup and view all the answers
What is one of the main advantages of using a threat intelligence platform (TIP)?
What is one of the main advantages of using a threat intelligence platform (TIP)?
Signup and view all the answers
Which of the following types of threat intelligence data is NOT mentioned?
Which of the following types of threat intelligence data is NOT mentioned?
Signup and view all the answers
How do organizations enhance their threat intelligence?
How do organizations enhance their threat intelligence?
Signup and view all the answers
What is the purpose of honeypots in threat intelligence?
What is the purpose of honeypots in threat intelligence?
Signup and view all the answers
What is a key benefit of basing honeypots in the cloud?
What is a key benefit of basing honeypots in the cloud?
Signup and view all the answers
Which of the following is not a listed organization that provides network intelligence?
Which of the following is not a listed organization that provides network intelligence?
Signup and view all the answers
What does the acronym CVE stand for in the context of threat intelligence?
What does the acronym CVE stand for in the context of threat intelligence?
Signup and view all the answers
What is considered a challenge when accessing threat intelligence data?
What is considered a challenge when accessing threat intelligence data?
Signup and view all the answers
Study Notes
Module 3: Threat Intelligence
- This module focuses on evaluating threat intelligence sources.
- Information sources are used to communicate emerging network security threats.
- Various threat intelligence services are described.
3.1 Information Sources
- SANS Institute resources are largely free and include the Internet Storm Center (early warning system), NewsBites (weekly security news digest), @RISK (weekly digest of newly discovered attack vectors), Flash security alerts, and a Reading Room with over 1,200 research papers.
- SANS develops security courses.
- MITRE maintains a list of CVE (Common Vulnerabilities and Exposures) used by security organizations.
- FIRST is a security organization that brings together incident response teams of various organizations (government, commercial, educational) to share information and coordinate efforts.
- SecurityNews aggregates the latest security news, alerts, and vulnerabilities.
- (ISC)² provides vendor-neutral education and career services to over 75,000 professionals.
- CIS is a focal point for cyber threat prevention, protection, response, and recovery for governments through MS-ISAC.
Network Intelligence Communities (cont.)
- To remain effective, cybersecurity professionals must:
- Stay up-to-date on the latest threats (subscribe to real-time feeds, security websites, blogs, podcasts).
- Continue to upgrade skills (attend security training, workshops, conferences).
- Network security has a steep learning curve and requires ongoing professional development.
Cisco Cybersecurity Reports
- Cisco Annual Cybersecurity Report and the Mid-Year Cybersecurity Report help security professionals stay abreast of the latest threats.
- These reports provide updates on security preparedness, analysis of top vulnerabilities, factors behind attacks (adware, spam).
- Analysts should subscribe to these reports to understand threat actor tactics and learn how to mitigate these attacks.
Security Blogs and Podcasts
- Another way to stay updated on threats is through blogs and podcasts.
- Blogs and podcasts provide advice, research, and mitigation techniques.
- Cisco provides security blogs and podcasts from experts and the Cisco Talos Group.
- Subscribe to receive notifications of new content, and podcasts can be played from the internet or downloaded.
Lab - Evaluate Cybersecurity Reports
- Lab objectives:
- Part 1: Research Cyber Security Intelligence Reports
- Part 2: Research Cyber Security Intelligence Based on Industry
- Part 3: Research Cyber Security Threat Intelligence in Real Time
3.2 Threat Intelligence Services
- Threat intelligence services allow the exchange of threat information (vulnerabilities, IOCs, mitigation techniques) for personnel and security systems.
- As threats emerge, threat intelligence services create and distribute firewall rules and IOCs to subscribed devices.
- Cisco Talos Threat Intelligence Group is one such service.
Cisco Talos (cont.)
- Cisco Talos is a major commercial threat intelligence team comprised of experts and researchers.
- Its goal is to protect enterprise users, data, and infrastructure from active adversaries.
- The team collects information about active, existing, and emerging threats.
- It provides comprehensive protection (against attacks and malware) to subscribers.
- Cisco Security products can use real-time security solutions.
- It provides free software, services, resources, and data.
- It maintains security incident detection rule sets for Snort.org, ClamAV, and SpamCop network security tools.
FireEye
- FireEye offers security services using a three-pronged approach (security intelligence, expertise, technology).
- It provides SIEM and SOAR with the Helix Security Platform, leveraging behavioral analysis and threat detection.
- Helix is a cloud-hosted platform combining diverse security tools and threat intelligence.
- FireEye blocks attacks across web, and email vectors and latent malware.
- It addresses all stages of the attack lifecycle with a signatureless engine for zero-day threat detection.
Automated Indicator Sharing
- The U.S. Department of Homeland Security (DHS) offers a free service called Automated Indicator Sharing (AIS).
- Enables real-time exchange of cyber threat indicators (e.g., malicious IP addresses, phishing emails) between the U.S. Federal Government and the private sector.
- Creates an ecosystem where threats are immediately shared with the community for protection.
Common Vulnerabilities and Exposures (CVE) Database
- The United States government sponsored the MITRE Corporation to create and maintain a catalog of known security threats (CVE).
- The CVE serves as a dictionary for cybersecurity vulnerabilities, using unique CVE Identifiers to facilitate data sharing.
Threat Intelligence Communication Standards
- Network organizations and professionals share information to increase knowledge of threat actors and assets.
- Several open standards facilitate cross-platform communication.
- Three common standards are Structured Threat Information Expression (STIX), and Trusted Automated Exchange of Indicator Information (TAXII), and CybOX.
- STIX is used for exchanging threat information between organizations.
- TAXII facilitates the communication of CTI (Cyber Threat Intelligence) over HTTPS.
- CybOX specifies events and properties of network operations to support many cybersecurity functions.
Threat Intelligence Communication Standards (cont.)
- Open standards facilitate standardized cyber threat intelligence information exchange.
- The Malware Information Sharing Platform (MISP) is an open-source platform for sharing IOCs for newly discovered threats.
- MISP is supported by the EU and is used by over 6,000 organizations globally.
- MISP enables automated IOC sharing between people and machines using STIX and other export formats.
Threat Intelligence Platforms
- Multiple threat intelligence sources can be very time-consuming to access and use.
- Threat Intelligence Platforms (TIPs) centralize the collection of threat data from various sources and formats.
- Three main types of data are IOCs, TTPs, and reputation information for internet destinations/domains.
- TIPs aggregate and present threat intelligence data in a comprehensible and usable format.
Threat Intelligence Platforms (cont.)
- Organizations can contribute to threat intelligence by sharing intrusion data (typically automated).
- Threat intelligence services utilize subscriber data to keep current with emerging threats.
- Honeypots are simulated networks/servers that attract attackers.
- Gathering data from honeypots can be beneficial, but also presents potential risks.
- Cloud-hosted honeypots isolate them from production networks.
Lab – Identify Relevant Threat Intelligence
- Lab objectives:
- Part 1: Research MITRE CVEs
- Part 2: Access the MITRE ATT&CK Knowledge Base
- Part 3: Investigate Potential Malware
3.3 Threat Intelligence Summary
- Many organizations provide network intelligence.
- Keep up-to-date on threats and continuously improve skills.
- Utilize resources like the Cisco Annual and Mid-Year Cybersecurity Reports.
- Use security blogs and podcasts for threat information.
- Threat intelligence services allow exchange of threat information among personnel and security systems.
- These services create firewall rules and IOCs as threats emerge.
- Cisco Talos and FireEye are examples of these services.
- FireEye uses a three-pronged approach combining security intelligence, expertise, and technology.
- The U.S. Department of Homeland Security offers Automated Indicator Sharing (AIS)
- The MITRE Corporation maintains a catalog of known vulnerabilities and exposures called CVE.
- STIX, TAXII, and CybOX are key threat intelligence communication standards.
What Did I Learn in this Module? (summary)
- Various organizations (SANS, Mitre, FIRST, etc.) provide network intelligence information.
- Stay updated on threats and continuously improve skills. (Use Cisco reports, blogs, and podcasts.)
- Threat intelligence services allow for sharing threat data between personnel and security systems.
- Services create and distribute firewall rules and IOCs for subscribed devices. (Cisco Talos, FireEye)
- FireEye uses a three-pronged approach.
- The U.S. Department of Homeland Security's Automated Indicator Sharing (AIS) enables real-time exchange of cyber threat indicators.
- Common Vulnerabilities and Exposures (CVE) catalog is maintained by MITRE.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz focuses on evaluating various threat intelligence sources that are essential for network security. Learn about the role of organizations like SANS Institute, MITRE, and FIRST in providing timely information on emerging threats. Understand how these resources contribute to a proactive security stance.