Chapter 2 Vulnerability is a weakness that could be triggered accidentally or exploited intentionally to cause a security breach. ( Asset Value # Ease of exploit ) Threat is the potential for someone or something to exploit a vulnerability and breach security. A threat may be intentional or unintentional. ( Internal/ external, Malicious/ accidental ) Risk is the likelihood and impact (or consequence) of a threat actor exploiting a vulnerability. Advanced Persistent Threat (APT) was coined to understand the behavior underpinning modern types of cyber adversaries State actors have been implicated in many attacks, particularly on energy and health network systems. criminal syndicate can operate across the Internet from different jurisdictions than its victim, increasing the complexity of prosecution. Insider threats can be categorized as unintentional. Attack vector is the path that a threat actor uses to gain access to a secure system. 1. Direct Access- this is a type of physical or local attack 2.Removable media—the attacker conceals malware on a USB thumb drive 3. Email—the attacker sends a malicious file attachment via email 4.Remote and wireless— 5. Supply Chain 6. Web and Social Media Chapter 2B Threat intelligence sources 1. Dark web—sites, content, and services accessible only over a dark net 2. Open source intelligence (OSINT)—some companies operate threat intelligence services on an open-source basis 3. Closed/proprietary—the threat research and CTI data is made available as a paid subscription to a commercial threat intelligence platform 4. Automated Indicator Sharing (AIS) is a service offered by the Department of Homeland Security (DHS) for companies to participate in threat intelligence sharing 5. Indicators of compromise 6. Automated indicator sharing (AIS) - service offered by the Department of Homeland Security (DHS) A) Structured Threat Information eXpression (STIX)- File of informtion, part of the framework describes standard terminology for IoCs B) Trusted Automated eXchange of Indicator Information (TAXII) - The protocol provides a means for transmitting CTI data between servers and clients. indicator of compromise (IoC) is a residual sign that an asset or network has been successfully attacked or is continuing to be attacked. A tactic, technique, or procedure (TTP) is a generalized statement of adversary behavior. Threat map is an animated graphic showing the source, target, and type of attacks that have been detected by a CTI platform. File/Code Repositories Chapter 3