Cybersecurity Threat Landscape
Related domains:
2.0 Threats, Vulnerabilities, and Mitigations 22% 4.0 Security Operations 28%
Related sub-domains
2.1 Compare and contrast common threat actors and motivations. 2.2 Explain common threat vectors and attack surfaces. 2.3 Explain various types of vulnerabilities. 4.3 Explain various activities associated with vulnerability management.
Survey
Think about what could be included. Read the introduction / summary. Glance over the different titles and sub-titles, turn them into questions. View visual aids and read their captions.
Questions
While doing all of these steps, add questions. Ensure to answer on a separate page from the original questions.
What are the different threat actor types? What are the different threat actor classifications? What are the different cybersecurity threat classifications? How are the hackers hats truly defined? What are the legal and ethical implications of each? Explain the different threat actor attributes and the threat actor motivations. Explain how the different threat actor attributes causes threat actors to differentiate. What are threat vectors and attack surfaces? How are the different threat vectors exploitable? What increases or decreases attack surfaces? What are the different types of vulnerabilities? What are the different activities to manage vulnerabilities? How does vulnerability management help deal with risks? How is shadow IT defined? What are the different attacker motivations? What are the different threat vectors? And what are the means for using those vectors? What are the different attack surfaces, how do they relate to threat vectors? Define threat intelligence What are the different sources for threat intelligence? Explain each What is the purpose of threat intelligence? What is a vulnerability database, and why is it essential for threat intelligence programs? Why are indicators of compromise IoC important for threat intelligence? What are the different types of OSINT data sources? What are the different types of closed source intelligence? What are the factors that need to be considered when assessing threat intelligence? How should threat indicator management be conducted? What is threat management exchange? What are standardized security languages for threat indicator management? What is OASIS? What are ISACS?
Read
Focus on answering the questions, come up with more as necessary.
Write
Annotate thoughts and ideas Answer qeustions
Recite
Go back over appropriate sections
Reflect
How does this currently fit with what you know? How would you teach this to someone else?