1/5
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Attack surface
a system, application, or vulnerability that threat actors might exploit
Threat vector
the means that threat actors use to obtain access
Threat intelligence
is the set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment
Indicators of compromise (IoCs)
are the telltale signs that an attack has taken place and may include file signatures, log patterns, and other evidence left behind by attackers
Structured Threat Information eXpression (STIX)
is an XML language. In it’s current version, STIX 2.1 defines 18 STIX Domain Objects, including things like attack patterns, identities, malware, threat actors, and tools. These objects are then related to each other by one of two STIX Relationship Objects: either as a relationship or as a sighting
Trusted Automated eXchange of Intelligence Information (TAXII)
is intended to allow cyber-threat information to be communicated at the application layer via HTTPS. TAXII is specifically designed to support STIX data exchange