Exercise

  1. Write a short note on the threat.
  2. Write a short note on the exploits.
  3. Write a short note on vulnerability.
  4. Write a short note on the risk.
  5. Explain the threat intelligence lifecycle.
  6. How can we recognize different types of cyber-attacks?
  7. What are the emerging attack techniques?
  8. How  open source intelligence data sets get their information?
  9. Why use only reliable Open Source Intelligence information? Write a short note on it.
  10. What are the Cyber Threat intelligence use cases?
  11. What is malware? Write a short note on it.
  12. What is a user error? Write a short note on it.
  13. What are zero-day vulnerabilities?
  14. What are zero-day exploits and exploit kits?
  15. What happens if we are not using a reliable source of information? Write its consequences.