CTIA
問題一覧
1
Zero-day attack
2
Unstructured form
3
Sam used unreliable intelligence sources.
4
1-->9-->2-->8-->3-->7-->4-->6-->5
5
Threat profiling and attribution
6
Game theory
7
Tactical threat intelligence
8
Distributed Denial-of-Service (DDoS) attack
9
Green
10
Blueliv threat exchange network
11
Diagnostics
12
OSINT, CTI vendors, ISAO/ISACs
13
Level 2: increasing CTI capabilities
14
Fast-Flux DNS
15
Conducting a gap analysis
16
Data management
17
Tactical threat intelligence analysis
18
Analysis of competing hypotheses (ACH)
19
Alison should use https://archive.org to extract the required website information.
20
Providers of threat data feeds
21
Attack origination points
22
Recruit managed security service providers (MSSP)
23
Jim should monitor network traffic for malicious file transfers, file integrity monitoring, and eventlogs.
24
OCTAVE
25
TC complete
26
Centralized storage
27
Proactive surveillance feeds
28
Hacking forums
29
Processing and exploitation
30
related: www.infothech.org
31
Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs)
32
Low-level data
33
Organized hackers
34
Geographical anomalies
35
Brainstorming, interviewing, SWOT analysis, Delphi technique, and so on
36
Data collection through passive DNS monitoring
37
Normalization
38
Validated trust
39
Known unknowns
40
Expansion
41
True attribution
42
Burp suite
43
Understand frequency and impact of a threat
44
Passive data collection
45
Gateway
46
Scoring
47
The right presentation
48
Strategic users
49
OSINT
50
Weaponization
51
Level 3: CTI program in place
52
Operational threat intelligence
53
FININT
54
Sean should use online services such as netcraft.com to find the company’s internal URLs
55
Identification
56
Command and control
57
SQL injection and buffer overflow attack
58
MoSCoW
59
Centralized exchange architecture
60
Spatial context
61
Information sharing and analysis centers (ISACs)
62
Structured threat hunting
63
Processing and exploitation
64
Intelligence-led security testing
65
Risk prioritization
66
Hybrid trust
67
Collection requirements
68
Website mirroring
69
3 -> 1 -> 4 -> 2
70
Public tier
71
Validated trust
72
Critical path analysis
73
Workflow
74
Level 2: Procedural
75
Hardware and software information, network-related information, and technologies used by the company
76
Vulnerability management
77
Lindrpin analysis
78
c
79
Data correlation
80
A summary of threat actors most likely targeting the organization along with their motivations, intentions, and TTPs.
81
CHIS
82
Strategic threat intelligence
83
Activity-related attacks, social media sources, chat room conversations
84
Sharing tactical threat intelligence
85
Phase 2: event
86
Report findings and recommendations
87
Impersonation
88
Reinforcement learning
問題一覧
1
Zero-day attack
2
Unstructured form
3
Sam used unreliable intelligence sources.
4
1-->9-->2-->8-->3-->7-->4-->6-->5
5
Threat profiling and attribution
6
Game theory
7
Tactical threat intelligence
8
Distributed Denial-of-Service (DDoS) attack
9
Green
10
Blueliv threat exchange network
11
Diagnostics
12
OSINT, CTI vendors, ISAO/ISACs
13
Level 2: increasing CTI capabilities
14
Fast-Flux DNS
15
Conducting a gap analysis
16
Data management
17
Tactical threat intelligence analysis
18
Analysis of competing hypotheses (ACH)
19
Alison should use https://archive.org to extract the required website information.
20
Providers of threat data feeds
21
Attack origination points
22
Recruit managed security service providers (MSSP)
23
Jim should monitor network traffic for malicious file transfers, file integrity monitoring, and eventlogs.
24
OCTAVE
25
TC complete
26
Centralized storage
27
Proactive surveillance feeds
28
Hacking forums
29
Processing and exploitation
30
related: www.infothech.org
31
Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs)
32
Low-level data
33
Organized hackers
34
Geographical anomalies
35
Brainstorming, interviewing, SWOT analysis, Delphi technique, and so on
36
Data collection through passive DNS monitoring
37
Normalization
38
Validated trust
39
Known unknowns
40
Expansion
41
True attribution
42
Burp suite
43
Understand frequency and impact of a threat
44
Passive data collection
45
Gateway
46
Scoring
47
The right presentation
48
Strategic users
49
OSINT
50
Weaponization
51
Level 3: CTI program in place
52
Operational threat intelligence
53
FININT
54
Sean should use online services such as netcraft.com to find the company’s internal URLs
55
Identification
56
Command and control
57
SQL injection and buffer overflow attack
58
MoSCoW
59
Centralized exchange architecture
60
Spatial context
61
Information sharing and analysis centers (ISACs)
62
Structured threat hunting
63
Processing and exploitation
64
Intelligence-led security testing
65
Risk prioritization
66
Hybrid trust
67
Collection requirements
68
Website mirroring
69
3 -> 1 -> 4 -> 2
70
Public tier
71
Validated trust
72
Critical path analysis
73
Workflow
74
Level 2: Procedural
75
Hardware and software information, network-related information, and technologies used by the company
76
Vulnerability management
77
Lindrpin analysis
78
c
79
Data correlation
80
A summary of threat actors most likely targeting the organization along with their motivations, intentions, and TTPs.
81
CHIS
82
Strategic threat intelligence
83
Activity-related attacks, social media sources, chat room conversations
84
Sharing tactical threat intelligence
85
Phase 2: event
86
Report findings and recommendations
87
Impersonation
88
Reinforcement learning