SlideShare a Scribd company logo
Click Here
CYB205-1
Evolving Threat Landscapes
Lec. 01
COURSE LEARNING OUTCOMES
 Describe the evolving cybersecurity threat landscape.
 Explain cybersecurity mitigation and defense
strategies.
 Discuss modern-day cybersecurity trends.
 Define cyber security policy, enforcement and
compliance.
 Define Artificial Intelligence (AI).
COURSE EVALUATION
 Discussion Forums & Debate: 30%
 Individual Assignment: 15%
 Group Project (Case Study): 25%
 Final quiz/exam: 30%
Threat, Vulnerability, and Risk
Threat Actor
Threat intelligence types
Threat Intelligence Feeds
Threat intelligence sources
Traffic Light Protocol (TLP)
Agenda
Threat, Vulnerability, and Risk
Threat
Any circumstance or event with the potential to adversely impact
organizational operations, assets, or individuals.
Vulnerability
Weakness in an information system, system security procedures,
internal controls, or implementation that could be exploited or
triggered.
Risk
A measure of the extent to which an entity is threatened by a potential
circumstance or event.
CYB205-1 Evolving Threat Landscapes_01.pdf
CYB205-1 Evolving Threat Landscapes_01.pdf
Threat intelligence types
Strategic
High level info
on changing
risks
Tactical
Attacker Tools
Tactics,
Procedures
Operational
Incoming
attacks against
company or
industry
Technical
Indicators of
Compromise
High level Low level
Low Time-to-Live
High Time-to-Live
• What?
• Threat intelligence is information about threats
and threat actors that helps mitigate harmful
events in cyberspace.
• Why?
• Help organizations to understand the threats that
have, will, or are currently targeting the
organization.
• How?
• Open-source intelligence
• Commercial intelligence
Threat Intelligence Feeds
OSINT
Open Source Intelligence
• Derived from open sources (e.g. mainstream media, Internet forums, paste sites, etc.
• Pros: good for ‘context’ and ‘big picture’
• Cons: multiple languages, interpretation, noise
TECHINT
Technical Intelligence
• Technical indicators (e.g. IP addresses, hashes, domains, tools & techniques)
• Pros: easy to consume and drive automation
• Cons: difficult to ‘contextualize’
SIGINT
Signals Intelligence
• Derived from analysis of communications, often in one’s own environment
• Pros: low noise; if you’re seeing it, you’re experiencing it
• Cons: requires extensive apparatus
Threat intelligence sources
• Canadian Center for cyber Security CCCS
• Department of Homeland Security: Automated Indicator Sharing
• FBI: InfraGard Portal
• @abuse.ch: Ransomware Tracker
• SANS: Internet Storm Center
• VirusTotal: VirusTotal
• Cisco: Talos Intelligence
• VirusShare: VirusShare Malware Repository
• Google: Safe Browsing
• National Council of ISACs: Member ISACs
• The Spamhaus Project: Spamhaus
Open-source Intelligence Feeds
Commercial Intelligence Feeds
 Recorded Future
NIST 800-150 “Guide to Threat Information Sharing”
• Threat information that has been aggregated, transformed, analysed,
interpreted, or enriched to provide the necessary context for
decision-making processes.
CYB205-1 Evolving Threat Landscapes_01.pdf
Thank You

More Related Content

PDF
Threat Intelligence 101 - Steve Lodin - Submitted
PDF
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
PDF
SecurityOperations
PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
PPTX
Proactive Approach to OT incident response - HOUSECCON 2023
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PPTX
Cyber Threat Hunting Workshop
PDF
Cyber Threat Hunting Workshop.pdf
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
SecurityOperations
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Proactive Approach to OT incident response - HOUSECCON 2023
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Cyber Threat Hunting Workshop
Cyber Threat Hunting Workshop.pdf

Similar to CYB205-1 Evolving Threat Landscapes_01.pdf (20)

PDF
Cyber Threat Hunting Workshop.pdf
PPTX
Security Operations Center Analyst Presentation
PDF
The Threat Landscape & Network Security Measures
PDF
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
PDF
[Bucharest] Attack is easy, let's talk defence
PDF
Custom defense - Blake final
PPTX
Best Practices for Scoping Infections and Disrupting Breaches
PPTX
Security in the age of open source - Myths and misperceptions
PDF
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
PPTX
Managing security threats in today’s enterprise
PPTX
Cyber Threat Hunting with Phirelight
PPTX
Using Threat Intelligence to Address Your Growing Digital Risk
PDF
2015 Cyber Security
PPTX
Cyber security for business
PDF
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
PPT
Cs461 06.risk analysis (1)
PDF
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
PDF
Webinar - Reducing the Risk of a Cyber Attack on Utilities
PDF
distinguishing-threat-actors-vectors-and-intelligence-sources-slides.pdf
PDF
SplunkLive Auckland 2015 - Splunk for Security
Cyber Threat Hunting Workshop.pdf
Security Operations Center Analyst Presentation
The Threat Landscape & Network Security Measures
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
[Bucharest] Attack is easy, let's talk defence
Custom defense - Blake final
Best Practices for Scoping Infections and Disrupting Breaches
Security in the age of open source - Myths and misperceptions
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
Managing security threats in today’s enterprise
Cyber Threat Hunting with Phirelight
Using Threat Intelligence to Address Your Growing Digital Risk
2015 Cyber Security
Cyber security for business
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
Cs461 06.risk analysis (1)
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
Webinar - Reducing the Risk of a Cyber Attack on Utilities
distinguishing-threat-actors-vectors-and-intelligence-sources-slides.pdf
SplunkLive Auckland 2015 - Splunk for Security
Ad

Recently uploaded (20)

PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Business Ethics Teaching Materials for college
PDF
Insiders guide to clinical Medicine.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
master seminar digital applications in india
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Business Ethics Teaching Materials for college
Insiders guide to clinical Medicine.pdf
O7-L3 Supply Chain Operations - ICLT Program
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Week 4 Term 3 Study Techniques revisited.pptx
Pharma ospi slides which help in ospi learning
Final Presentation General Medicine 03-08-2024.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Renaissance Architecture: A Journey from Faith to Humanism
master seminar digital applications in india
Anesthesia in Laparoscopic Surgery in India
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Ad

CYB205-1 Evolving Threat Landscapes_01.pdf

  • 2. COURSE LEARNING OUTCOMES  Describe the evolving cybersecurity threat landscape.  Explain cybersecurity mitigation and defense strategies.  Discuss modern-day cybersecurity trends.  Define cyber security policy, enforcement and compliance.  Define Artificial Intelligence (AI).
  • 3. COURSE EVALUATION  Discussion Forums & Debate: 30%  Individual Assignment: 15%  Group Project (Case Study): 25%  Final quiz/exam: 30%
  • 4. Threat, Vulnerability, and Risk Threat Actor Threat intelligence types Threat Intelligence Feeds Threat intelligence sources Traffic Light Protocol (TLP) Agenda
  • 5. Threat, Vulnerability, and Risk Threat Any circumstance or event with the potential to adversely impact organizational operations, assets, or individuals. Vulnerability Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered. Risk A measure of the extent to which an entity is threatened by a potential circumstance or event.
  • 8. Threat intelligence types Strategic High level info on changing risks Tactical Attacker Tools Tactics, Procedures Operational Incoming attacks against company or industry Technical Indicators of Compromise High level Low level Low Time-to-Live High Time-to-Live
  • 9. • What? • Threat intelligence is information about threats and threat actors that helps mitigate harmful events in cyberspace. • Why? • Help organizations to understand the threats that have, will, or are currently targeting the organization. • How? • Open-source intelligence • Commercial intelligence Threat Intelligence Feeds
  • 10. OSINT Open Source Intelligence • Derived from open sources (e.g. mainstream media, Internet forums, paste sites, etc. • Pros: good for ‘context’ and ‘big picture’ • Cons: multiple languages, interpretation, noise TECHINT Technical Intelligence • Technical indicators (e.g. IP addresses, hashes, domains, tools & techniques) • Pros: easy to consume and drive automation • Cons: difficult to ‘contextualize’ SIGINT Signals Intelligence • Derived from analysis of communications, often in one’s own environment • Pros: low noise; if you’re seeing it, you’re experiencing it • Cons: requires extensive apparatus Threat intelligence sources
  • 11. • Canadian Center for cyber Security CCCS • Department of Homeland Security: Automated Indicator Sharing • FBI: InfraGard Portal • @abuse.ch: Ransomware Tracker • SANS: Internet Storm Center • VirusTotal: VirusTotal • Cisco: Talos Intelligence • VirusShare: VirusShare Malware Repository • Google: Safe Browsing • National Council of ISACs: Member ISACs • The Spamhaus Project: Spamhaus Open-source Intelligence Feeds Commercial Intelligence Feeds  Recorded Future
  • 12. NIST 800-150 “Guide to Threat Information Sharing” • Threat information that has been aggregated, transformed, analysed, interpreted, or enriched to provide the necessary context for decision-making processes.