CTI 101 Notes

CyberThreatIntelligence101 Notes

Featured image

This is my notes for CTI101 Course. You can find the course Here

Table of Contents

Objectives of Threat Intelligence

Cyber threat intelligence (CTI)

CTI is the gathering of information from various sources about current or potential threats to an organization.

“CYBER”

The word ‘cyber’ denotes a relationship with information technology (IT), i.e., computers. (It can relate to all aspects of computing, including storing data, protecting data, accessing data, processing data, transmitting data, and linking data.)

“THREAT”

“INTELLIGENCE”

Notes:

Indicators of compromise (IOCs)

Are pieces of forensic data, such as data found in system log entries or files, that identify potentially malicious activity on a system or network.

CTI in practice within an organization:

Basic Web Layers:

  1. Surface Web
  2. Deep Web
  3. Dark Web

Risks risk is defined as a combination of threat, vulnerability and impact.

risks

Levels of Intelligence from an organizational perspective:

  1. Strategic Level -> The ‘board’ and senior decision makers.
  2. Operational Level -> SOC operations and security controls applications.
  3. Tactical Level -> Threat Hunting within log files

levels

Actionability: Threat Intelligence that a decision maker can take action on.

Note: The usefulness of cyber threat intelligence is predominantly based on its ‘actionability’ from an organizational standpoint.

Different sources of intelligence:

Why organizations need/use CTI ?

CTI Analyst:

A Cyber Threat Intelligence Analyst is a specialized role within an organization and the wider professional practice of cyber security.

The roles and responsibilities of a CTI Analyst includes:

Introduction to Threat Actors

Hackers:

Types of Hackers:

Black Hat Hackers Types:

  1. NATION STATE ACTORS:
    • Nation State Actors work for governments to disrupt or compromise other target governments, organizations or individuals to gain access to intelligence or valuable data.
    • They have been known to create significant international incidents.
    • Generally speaking they can operate without fear of legal retribution in their home country and are often part of ‘hackers for hire’ companies aligned to the aims of a government or dictatorship.
  2. CYBER CRIMINALS:
    • Cyber Criminals are individuals or teams of people who commit malicious activities on networks and digital systems, with the intention of stealing sensitive organization data or personal data, and generating profit.
    • It’s important to note that the distinction between cyber criminals and nation state actors is becoming increasingly blurred.
    • They are normally always motivated by financial gain.
  3. HACKTIVISTS:
    • Hacktivists generally operate within the social or political sphere, breaking into and causing damage to computer systems and networks.
    • Targets of hacktivists can vary dramatically from things like the Church of Scientology, to pharmaceutical companies and drug dealers.
    • Hacktivism is a combination of the words ‘Hacking’ and ‘Activism’.
    • One of the most (in)famous hacktivist groups of recent times would have to be Anonymous, and they are well worth doing some reading on.

The 3 primary ways of measuring threat actors:

CIA Triad:

‘CIA triad’ stands for Confidentiality, Integrity, and Availability. It is a common model that forms the basis for the development of secure systems.

Mandiant’s APT1 Report highlights:

Threat Vectors

Threat Vector is a path or method via which threat gains access to a victim computer or network.

Note: Threats can exploit vulnerabilities in Emails, Users, Software, Networks, Host, Remote Access Portals.

Security Controls:

countermeasures that a company can implement to detect, prevent, reduce or counteract security risk(s). such as:

Attack Surface

Watering hole attack

  1. Attackers find a suitable website (The Watering Hole)
  2. Attackers compromise the website
  3. User visits the website and malicious script is downloaded
  4. Script exploits vulnerabilities and delivers malware to the user
  5. Attackers have access to the network and continue trying to reach their objective

Notes:

The Intelligence Cycle

The process of developing raw information into finished intelligence for an end consumer..

  1. Direction: where the intelligence team takes direction from the customer (intelligence requirements).
  2. Collection: where the intelligence team collects data and turns into information.
  3. Analysis: where information is turned into intelligence.
  4. Dissemination: where the intelligence is handed back to the client, which in turn stimulates new Direction

Data vs Information vs Intelligence

The intelligence cycle and its steps can be communicated in different ways dependent on who you speak with but some of the key elements that everyone can agree with sit below:

By following this structured process, organizations can ensure that they have a complete and up-to-date understanding of the cyber threat landscape, and can take effective steps to protect themselves from potential threats.

Introduction to Law and Ethics

Laws are structured rules that are used to govern society.

Ethics are generally considered as moral values that an individual may establish as their own personal rules to live by.

Note: You can be fired for not following company ethical guidelines even though you haven’t broken any laws.

Difference between Law & Ethics:

Factor Law Ethics
At its core Set of rules and regulations not to break Set of guidelines that a person should follow
Governed by Government and enforced by the judiciary and police Individual, Legal and Professional norms
Penalty for infringement Custody or fine Sanction

Resources