Threat Vectors and Attack Surfaces + Threat Data and Intelligence + Threat Indicator Management and Exchange

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/5

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

6 Terms

1
New cards

Attack surface

a system, application, or vulnerability that threat actors might exploit

2
New cards

Threat vector

the means that threat actors use to obtain access

3
New cards

Threat intelligence

is the set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment

4
New cards

Indicators of compromise (IoCs)

are the telltale signs that an attack has taken place and may include file signatures, log patterns, and other evidence left behind by attackers

5
New cards

Structured Threat Information eXpression (STIX)

is an XML language. In it’s current version, STIX 2.1 defines 18 STIX Domain Objects, including things like attack patterns, identities, malware, threat actors, and tools. These objects are then related to each other by one of two STIX Relationship Objects: either as a relationship or as a sighting

6
New cards

Trusted Automated eXchange of Intelligence Information (TAXII)

is intended to allow cyber-threat information to be communicated at the application layer via HTTPS. TAXII is specifically designed to support STIX data exchange