1.4 Compare and contrast threat-intelligence and threat-hunting concepts

Threat actors

  • Advanced persistent threat
    (APT)
  • Hacktivists
  • Organized crime
  • Nation-state
  • Script kiddie
  • Insider threat
    o Intentional
    o Unintentional
  • Supply chain
    • Tactics, techniques, and
    procedures (TTP)
    • Confidence levels
  • Timeliness
  • Relevancy
  • Accuracy
    • Collection methods and sources
  • Open source
    o Social media
    o Blogs/forums
    o Government bulletins
    o Computer emergency
    response team (CERT)
    o Cybersecurity incident
    response team (CSIRT)
    o Deep/dark web
  • Closed source
    o Paid feeds
    o Information sharing
    organizations
    o Internal sources
    • Threat intelligence sharing
  • Incident response
  • Vulnerability management
  • Risk management
  • Security engineering
  • Detection and monitoring
    • Threat hunting
  • Indicators of compromise (IoC)
    o Collection
    o Analysis
    o Application
  • Focus areas
    o Configurations/
    misconfigurations
    o Isolated networks
    o Business-critical assets
    and processes
  • Active defense
  • Honeypot