BIE-UKB Lecture 03 Recall: Security development lifecycle, introduction to concepts of applications security
  - Bug - any defect in a product
    
      - behavior violating specification
 
- Exploit - sequence of commands that takes advantage of a bug or vulnerability
- from implicit to explicit rights
- FMEA - Failure Mode and Effects Analysis
- Software Release Life Cycle (SRL)
    
      - Linear release model
- Experimental/Stable releases
- Extended support (LTS/ERS)
 
BIE-UKB Lecture 04 Notes: Threat Intelligence, Cyber Crime and its Economy
Terms
  - Intrusion Detection System (IDS)
    
      - NIDS - Network IDS
- HIDS - Host IDS
 
- Intrusion Protection System (IPS)
    
      - NIPS - Network IPS
- HIPS - Host IPS
 
- Data Execution Prevention (DEP)
- Tactics, Techniques, and Procedures (TTP)
    
  
Threat Intelligence
  - Sliding Scale of CyberSecurity
    
      - model of categories of actions and investments that contribute to cyber security
- cost vs. trade-off
 
- Types of the Threat Intelligence
    
      - strategic
- tactical
- operational
 
- Intelligence provides insight based on analysis
- Threat Intelligence is a specific type of intelligence that seeks to give defenders knowledge of the adversary, their actions within the defender's environment, and their capabilities as well as their tactics, techniques, and procedures
- Threat Intelligence is data containing detailed knowledge about the cybersecurity threats targeting an organization (def. by IBM)
- What is it?
    
      - NOT raw data, but a structured result of analysis
- Organization-specific
- Detailed and contextual
- Actionable
        
      
- Risk Analysis Input
 
- Security Intelligence
    
      - superset - integral analysis
 
Vulnerability Modeling
  - Cyber Kill Chain
    
      - Aim is to identify an attack in each step and break the chain
 
- Diamond Model
- The Unified Kill Chain
    
      - Kill Chain (Lockheed Martin), is perimeter- and malware-focused
- fails to cover other attack vectors and attacks that occur behind the organizational perimeter
- Unified Kill Chain offers significant improvements over these scope limitations of the original model
 
Cyber Crime
  - Hacker
    
      - Dennis MacAlistair Ritchie & Brian Wilson Kernighan & Ken Thompson
- Richard Stallman
- Linus Torvalds
 
- Cracker
- Ethical Hacker
    
      - penetration tests (pen test)
 
- criminal activity that involves a computer, networked device or a network
- FBI's Internet Crime Complaint Center (IC3): defines cybercrime as those Internet crimes perpetrated against individuals, regardless of whether the individuals were victimized (e.g., receiving a phishing email would apparently be counted in the statistics)
Advanced Persistent Threat (APT)
  - Advanced, sophisticated and sustained
- Persistent, establishing an undetected presence
- Threat, having capability and malicious intent