What are the…
Five phases of the Threat Intellience Cycle
Provide the purpose of…
Planning & Requirements
Threat Intelligence Cycle
Provide the purpose of…
Collection & Processing
Threat Intelligence Cycle
Potential collection end-points include; cloud, phones, routers, servers, apps, laptops, etc…
Provide the purpose of…
Analysis
Threat Intelligence Cycle
Automation could include; Scripts (Bash, Python, PowerShell…)
Provide the purpose of…
Dissemination
Threat Intelligence Cycle
Provide the purpose of…
Feedback
Threat Intelligence Cycle
Whats the time frame of…
Strategic Intelligence
Long-term goals
Whats the time frame of…
Operational Intelligence
Shorter-term goals
Whats the time frame of…
Tactical Intelligence
Real-time goals
What is…
Security Intelligence
How secure are we?
What is…
Cyber Threat Intelligence
How threatening is the world?
* Narrative Sources
* Threat Feeds
Threat feeds are online resources that can be queried. Flow of known vulnerabilities, IP addresses, anti-virus softwares, necessary patches, real-time attacks, etc…
What is… used for?
Historical / Trend Analysis
Used to indicator potential threats
Describe what… is used for
Reconnaisance
As a defender
Use of open-sourced (public) data to analysis a target (e.g. Social Media, websites, job descriptions, LinkedIN)
What does … stand for?
OSINT
Open-source Intelligence
The process of gathering and analyzing publicly available information to assess threats, make decisions, and/or answer specific questions.
What is a … ?
zone transfer
Usually used to transfer DNS to new server; however could be used to fetch ALL DNS server information if misconfigured poorly
What are … used for?
Website Rippers
Clones the entire target website
Used for interacting with the website and see potential vulnerabilities
What are important for … ?
Confidence Levels
Information source
What is the … ?
Admiralty System
A method for evaluating a source and the credibility of an information source
What is … used for?
Information Sharing and Analysis Centers
Sources for industry specific security information
Whats the purpose of … ?
Vulnerability Management
Keep an overview of security holes within organization
meltdown / spectre are two classic vulnerabilities to be aware of
enables us to patch problem before they get exploited
What does the process of … look like?
Vulnerability Management
What are … ?
Unknown Threats
Threats that only present themselves via behaviors (aka breaks the mould)
Very advanced malware or Zero-day vulnerability
Describe the … ?
The Johari Window
Describe the behavior of …
APT
Advanced coordinated group(s) with the ability to establish persistent presence. Malicious actors by nature.
CYSA Exam - Well funded, Governmentally supported
Technically - Anyone with ability to break into something