Cybersecurity Concepts

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/8

flashcard set

Earn XP

Description and Tags

A set of flashcards covering key cybersecurity concepts including indicators of compromise, attack behaviors, and tools used in threat intelligence.

Last updated 4:19 PM on 4/16/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

9 Terms

1
New cards

What are the key components of Indicators of Compromise (IoCs)?

IPs, hashes, URLs, domains.

2
New cards

What does Indicators of Attack (IoA) refer to?

Behaviors or tactics such as lateral movement and privilege escalation.

3
New cards

What is the MITRE ATT&CK framework used for?

It describes the tactics and techniques used by adversaries.

4
New cards

What does SIEM stand for and what is its purpose?

Security Information and Event Management; it correlates events from various sources.

5
New cards

Name a tool that automates incident response.

SOAR (Security Orchestration, Automation and Response).

6
New cards

What is Wireshark used for?

Packet analysis for inspecting network traffic.

7
New cards

What do STIX and TAXII represent in threat intelligence?

Sharing formats for threat intelligence data.

8
New cards

What does OSINT stand for and what does it refer to?

Open Source Intelligence; it refers to public threat data sources like Shodan and VirusTotal.

9
New cards

What are threat feeds?

Indicators of compromise provided by vendors or Information Sharing and Analysis Centers (ISACs).