Threat Intelligence Module 3
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following organizations provides network intelligence?

  • SANS
  • FIRST
  • MITRE
  • ISC2
  • CIS
  • All of the above (correct)
  • What is the name of the weekly digest of news articles about computer security published by SANS?

    NewsBites

    What does CVE stand for?

    Common Vulnerabilities and Exposures

    What is the name of the open-source platform for sharing indicators of compromise for newly discovered threats?

    <p>Malware Information Sharing Platform (MISP)</p> Signup and view all the answers

    The Cisco Talos Threat Intelligence Group is a commercial threat intelligence team.

    <p>True</p> Signup and view all the answers

    FireEye uses a three-pronged approach, combining security intelligence, security expertise, and technology, to help enterprises secure their networks?

    <p>True</p> Signup and view all the answers

    What are some of the ways to stay up-to-date on the latest cybersecurity threats?

    <p>All of the above</p> Signup and view all the answers

    Automated indicator sharing (AIS) is a free service offered by the U.S. Department of Homeland Security (DHS).

    <p>True</p> Signup and view all the answers

    Threat intelligence platforms are designed to aggregate data from numerous sources and present the data in a comprehensible format.

    <p>True</p> Signup and view all the answers

    Honeypots are designed to attract attackers, and the attack-related information gathered from honeypots can be shared with threat intelligence platform subscribers.

    <p>True</p> Signup and view all the answers

    Study Notes

    Module 3: Threat Intelligence

    • This module evaluates threat intelligence sources.
    • Topics include information sources and threat intelligence services.

    3.1 Information Sources

    • SANS Institute: Offers resources, including the Internet Storm Center, NewsBites, @RISK, Flash security alerts, and Reading Room.

    • Mitre: Maintains a list of CVE (Common Vulnerabilities and Exposures).

    • FIRST: A security organization bringing together various incident response teams from different sectors.

    • SecurityNews: A portal aggregating breaking security news.

    • (ISC)²: Provides vendor-neutral education and career services.

    • CIS: A focal point for cyber threat prevention for governments, offering 24/7 threat warnings.

    • Staying Updated: Network security professionals must stay abreast of the newest threats via real-time feeds, security blogs, podcasts and websites. Continuous professional development, via training, workshops, and conferences, is required.

    • Cisco Cybersecurity Reports: Annual and Mid-Year reports, analyze security preparedness, vulnerabilities, the explosion of attacks through malware.

    • Security Blogs and Podcasts: Provide advice, research, and mitigation techniques for threats and exploit.

    • Labs: Research cyber security intelligence reports, industry based cyber security intelligence, and real-time cyber security threats are key learning objectives.

    3.2 Threat Intelligence Services

    • Cisco Talos: Exchanging threat information like vulnerabilities, compromise indicators (IOC), and mitigation techniques. This is shared with personnel and security systems. Firewall rules and IOCs are distributed to subscribed devices.
    • FireEye: A security company offering security intelligence, expertise, and technology. Combining security intelligence, security expertise, and technology via a three-pronged approach. Uses behavioral analysis and advanced threat detection with the Helix Security Platform and FireEye Mandiant worldwide threat intelligence network. Blocks attacks across web and email threat vectors, and latent malware. Addresses all stages of an attack lifecycle with a signature-less engine using stateful attack analysis to detect zero-day threats.

    Automated Indicator Sharing

    • DHS (US Department of Homeland Security): Offers Automated Indicator Sharing (AIS). Real-time exchange of cyber threat indicators (malicious IPs, phishing emails) between the US Federal Government and the private sector. Immediately shares recognized threat to the community to help protect networks.

    Common Vulnerabilities and Exposures (CVE) Database

    • MITRE Corporation: Created and maintains a catalog of known security threats (CVE), acting as a dictionary of common names (CVE identifiers) for known cybersecurity vulnerabilities. Facilitating data sharing.

    Threat Intelligence Communication Standards

    • Standards: Network organizations and professionals require sharing information to increase knowledge about threat actors and the assets they want to access; several standardized communication formats evolved to enable this.
    • STIX (Structured Threat Information Expression): A specification for exchanging cyber threat information between organizations, including the CybOX standard.
    • TAXII (Trusted Automated Exchange of Indicator Information): The specification of an application layer protocol that allows communication of threat intelligence (CTI) over HTTPS, supporting STIX.
    • CybOX: Standardized schemas used to specify, capture, characterize network operations, and communicate events.
    • MISP (Malware Information Sharing Platform): An open-source platform for sharing indicators of compromise (IOCs) for newly discovered threats. Supported by the European Union, used by over 6,000 organizations globally.

    Threat Intelligence Platforms

    • Sources and Formats: Many sources of threat intelligence information each having its own format. Accessing multiple sources can be time-consuming.
    • Threat Intelligence Platform (TIP): Centralizes collection of threat data from numerous sources, aggregating data in a comprehensible and usable format.
    • Data Types: Three major types of threat intelligence data: Indicators of Compromise (IOC), Tools, Techniques, Procedures (TTP), and reputation data for internet destinations/domains.
    • Honeypots: Simulated networks used to attract attackers, and collecting attack-related data for sharing. Cloud-hosted honeypots are isolated from production networks.

    Lab - Identify Relevant Threat Intelligence

    • Objectives: Research MITRE CVEs, access the MITRE ATT&CK Knowledge Base, and investigate potential malware.

    3.3 Threat Intelligence Summary

    • Organizations: Several organizations provide threat intelligence (SANS, Mitre, FIRST, SecurityNewsWire, (ISC)2, CIS).
    • Stay Updated: Staying abreast of threats and skill upgrades are critical.
    • Resources: Cisco reports (Annual, Mid-Year), blogs, and podcasts are helpful.
    • Intelligence Services: Threat intelligence services facilitate exchanging threat information, thus creating and distributing firewall rules and IOCs.
    • Specific Services: Cisco Talos, FireEye are examples providing these services.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers the various sources of threat intelligence, essential for understanding the cybersecurity landscape. Topics include notable organizations like SANS Institute, Mitre, FIRST, and the importance of staying updated on threats through continuous professional development.

    More Like This

    Use Quizgecko on...
    Browser
    Browser