cmsc 426 final lecture 12

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

policy?

Formal rules and guidelines. Can be organizational, state, national, or international.

2
New cards

examples of cyber policies?

Security plans, laws, frameworks (like NIST), treaties (e.g., Budapest Convention).

3
New cards

Why is policy hard?

Balancing security, privacy, usability, and compliance is tricky.

4
New cards

What are common policy trade-offs?

Security vs. privacy, centralization vs. federation.

5
New cards

intelligence in cybersecurity?

Collecting and analyzing info to understand threats (Cyber Threat Intelligence).

6
New cards

Why is Cyber Threat Intelligence (CTI) important?

Helps make decisions, update policies, and defend systems proactively.

7
New cards

What are the stages of the CTI lifecycle?

  • Direction

  • Collection

  • Enrichment

  • Analysis

  • Dissemination

  • Feedback

8
New cards

Indicators of Compromise (IOCs)?

Clues left behind in attacks: IPs, file hashes, domains, emails, wallets.

9
New cards

Tactics, Techniques, and Procedures (TTPs)?

A hacker’s habits—what they do, how, and who they target.

10
New cards

attribution in cyberattacks?

Figuring out who did it using IOCs/TTPs. Hard due to fake clues (“false flags”).

11
New cards

Why share threat intelligence?

Stronger together—sharing helps defend everyone against threats.

12
New cards

. What is modeling in cybersecurity?

Finding threats and weaknesses using STRIDE, PASTA, or MITRE ATT&CK.