Intelligence sources Flashcards

(12 cards)

1
Q

Indicators of Compromise

A

Malware samples, IP addresses and domain names are used to update firewalls and detection systems and understand threat actors’ TTPs. These are raw data but included within CTI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Client-derived Data

A

Extracted from client infrastructure or SIEM/logs. Used with other sources for proactive measures like threat hunting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Deep Web

A

Members-only hacking forums provide insight into tools and services requested and advertised by cybercriminals. Can include exploits and inform patch prioritisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dark Web

A

Used to identify if credentials are present on marketplaces hosted on anonymity-focused networks like Tor or I2P. Also used to detect intent to target infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Messaging Platforms

A

Used by threat actors to communicate and sell goods/services. Preferred over semi-public forums for direct engagement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cyber Activists Communication

A

Use IRC channels and messaging platforms to discuss operations, providing insight into tactics and targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social Media

A

Used by low-capability actors to signal intent. Also used by criminals to attract customers and may reveal data leaks or insider threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Human Intelligence

A

Derived from engagement via various sources. Must be collected ethically and legally, complying with regulations like GDPR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware Analysis

A

Extracts indicators of compromise and helps understand threat actors’ TTPs to inform network defenders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Use of Geopolitical Developments in CTI?

A

Used to understand the intent of nation-state actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can be derived from Paste Sites?

A

Reveal leaked credentials, activist operations, code snippets, and breach evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Information Sharing Platforms

A

Provide context and insight into threat actors’ activity. Often divided by national or sectoral boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly