• Complain

Troy McMillan - CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed Edition

Here you can read online Troy McMillan - CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed Edition full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2020, publisher: Pearson, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed Edition
  • Author:
  • Publisher:
    Pearson
  • Genre:
  • Year:
    2020
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed Edition: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed Edition" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Troy McMillan: author's other books


Who wrote CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed Edition? Find out the surname, the name of the author of the book and a list of all author's works by series.

CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed Edition — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed Edition" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
CompTIA Cybersecurity Analyst CySA CS0-002 Cert Guide 2ed Edition - image 1
CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide

Troy McMillan
()

CompTIA Cybersecurity Analyst CySA CS0-002 Cert Guide 2ed Edition - image 2

Contents
Chapter 1. The Importance of Threat Data and Intelligence

This chapter covers the following topics related to Objective 1.1 (Explain the importance of threat data and intelligence) of the CompTIA Cybersecurity Analyst (CySA+) CS0-002 certification exam:

: Examines open-source intelligence, proprietary/closed-source intelligence, timeliness, relevancy, and accuracy

: Covers the importance of identifying levels of confidence in data

: Introduces Structured Threat Information eXpression (STIX), Trusted Automated eXchange of Indicator Information (TAXII), and OpenIOC

: Investigates known threats vs. unknown threats, zero-day threats, and advanced persistent threats

: Identifies actors such as nation-state, hacktivist, organized crime, and intentional and unintentional insider threats

: Explains the requirements, collection, analysis, dissemination, and feedback stages

: Describes the types of malware that commonly infect networks

: Discusses data sharing among members of healthcare, financial, aviation, government, and critical infrastructure communities

When a war is fought, the gathering and processing of intelligence information is critical to the success of a campaign. Likewise, when conducting the daily war that comprises the defense of an enterprises security, threat intelligence can be the difference between success and failure. This opening chapter discusses the types of threat intelligence, the sources and characteristics of such data, and common threat classification systems. This chapter also discusses the threat cycle, common malware, and systems of information sharing among enterprises.

Do I Know This Already? Quiz

The Do I Know This Already? quiz enables you to assess whether you should read the entire chapter. If you miss no more than one of these seven self-assessment questions, you might want to skip ahead to the Exam Preparation Tasks section. lists the major headings in this chapter and the Do I Know This Already? quiz questions covering the material in those headings so that you can assess your knowledge of these specific areas. The answers to the Do I Know This Already? quiz appear in Appendix A.

Table 1-1 Do I Know This Already? Foundation Topics Section-to-Question Mapping

Caution The goal of self-assessment is to gauge your mastery of the topics in - photo 3

Caution

The goal of self-assessment is to gauge your mastery of the topics in this chapter. If you do not know the answer to a question or are only partially sure of the answer, you should mark that question as wrong for purposes of the self-assessment. Giving yourself credit for an answer you correctly guess skews your self-assessment results and might provide you with a false sense of security.


Which of the following is an example of closed-source intelligence?

a. Internet blogs and discussion groups

b. Print and online media

c. Unclassified government data

d. Platforms maintained by private organizations

Which of the following is an application protocol for exchanging cyber threat information over HTTPS?

a. TAXII

b. STIX

c. OpenIOC

d. OSINT

Which of the following are threats discovered in live environments that have no current fix or patch?

a. Known threats

b. Zero-day threats

c. Unknown threats

d. Advanced persistent threats

Which of the following threat actors uses attacks as a means to get their message out and affect the businesses that they feel are detrimental to their cause?

a. Organized crime

b. Terrorist group

c. Hacktivist

d. Insider threat

In which stage of the intelligence cycle does most of the hard work occur?

a. Requirements

b. Collection

c. Dissemination

d. Analysis

Malware that is widely available for either purchase or by free download is called what?

a. Advanced

b. Commodity

c. Bulk

d. Proprietary

Which of the following information sharing and analysis communities is driven by the requirements of HIPAA?

a. H-ISAC

b. Financial Services Information Sharing and Analysis Center

c. Aviation Government Coordinating Council

d. ENISA

Foundation Topics
Intelligence Sources

Threat intelligence comes in many forms and can be obtained from a number of different sources. When gathering this critical data, the security professional should always classify the information with respect to its timeliness and relevancy. Lets look at some types of threat intelligence and the process of attaching a confidence level to the data.

CompTIA Cybersecurity Analyst CySA CS0-002 Cert Guide 2ed Edition - image 4
Open-Source Intelligence

(OSINT) consists of information that is publicly available to everyone, though not everyone knows that it is available. OSINT comes from public search engines, social media sites, newspapers, magazine articles, or any source that does not limit access to that information. Examples of these sources include the following:

Print and online media

Internet blogs and discussion groups

Unclassified government data

Academic and professional publications

Industry group data

Papers and reports that are unpublished (gray data)

CompTIA Cybersecurity Analyst CySA CS0-002 Cert Guide 2ed Edition - image 5
Proprietary/Closed-Source Intelligence

sources are those that are not publicly available and usually require a fee to access. Examples of these sources are platforms maintained by private organizations that supply constantly updating intelligence information. In many cases this data is developed from all of the providers customers and other sources.

An example of such a platform is offered by CYFIRMA, a market leader in predictive cyber threat visibility and intelligence. CYFIRMA announced the launch of cloud-based Cyber Intelligence Analytics Platform (CAP) v2.0. In 2019, using its proprietary artificial intelligence and machine learning algorithms, CYFIRMA helping organizations unravel cyber risks and threats and enable proactive cyber posture management.

Timeliness

One of the considerations when analyzing intelligence data (of any kind, not just cyber data) is the of such data. Obviously, if an organization receives threat data that is two weeks old, quite likely it is too late to avoid that threat. One of the attractions of closed-source intelligence is that these platforms typically provide near real-time alerts concerning such threats.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed Edition»

Look at similar books to CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed Edition. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed Edition»

Discussion, reviews of the book CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed Edition and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.