Threat Intelligence Glossary 1
Threat Intelligence Glossary 1
Threat Intelligence Glossary 1
Intelligence
Glossary
This document is designed to cover all acronyms used in the Threat Intelligence domain of
the Blue Team Level 1 certification training course.
This document is TLP:White, and can be shared without breaching the Terms and Conditions
of the BTL1 course.
Learn more about Blue Team Level 1 and purchase the certification here –
https://securityblue.team/why-btl1/
EDR // Endpoint Detection and Response – An EDR solution is typically an analysis platform
with software agents that run on endpoints, continuously sending information to the EDR
server for correlation, detecting anomalies and security events. EDRs can be configured to
take automatic actions, such as stopping network connections and generate alerts for
security analysts to investigate.
IDS/IPS/IDPS // Intrusion Detection and Prevention System – Typically systems will have
either Intrusion Detection functionality, reporting on unusual or suspicious activity by
generating alerts and logs, or Intrusion Prevention functionality, working to autonomously
stop attempts without needing to wait for human intervention.
CTI // Cyber Threat Intelligence – The phrase given to security professionals and the industry
surrounding the practice of threat intelligence in the cyber realm. The attribution of threat
actors to cyber activity, and the sharing of intelligence to allow defenders to respond or
prepare for cyber-attacks.
TTP // Tools, Techniques, and Procedures – MITRE have defined over 240 unique tactics
used by adversaries, known as TTPs. You can find them here, each with detailed
descriptions, and the threat actors that have been known to use them.
SHA256 // Secure Hash Algorithm 256 - SHA-256 is a one-way function that converts a text
of any length into a string of 256 bits. This is known as a hashing function. In this case, it is
a cryptographically secure hashing function, in that knowing the output tells you very little
about the input. It is a modified version of SHA1
CVSS // Common Vulnerability Severity Scoring – The scoring system used to classify how
severe vulnerabilities are based on a number of factors including technical sophistication,
exploitation vector, and privileges needed for successful exploitation.
RDP // Remote Desktop Protocol – A Windows protocol that allows users to access other
Windows systems using a graphical user interface as if they were on the system. Used by
system administrators to access servers, or by IT support personnel to assist users. Can also
be utilized by malicious actors to move around a network.
VPR // Vulnerability Priority Rating – A vulnerability scoring system created by Tenable that
utilizes threat intelligence context to rate vulnerabilities based on the likelihood of them
being exploited, and the impact successful exploitation would have.
SIGINT // Signals Intelligence - Signal intelligence involves the interception of radio signals
and broadcast communications to gather intelligence.
ELINT // Electronic Intelligence - Electronic intelligence is collected from systems not used
directly for communications, such as guidance communication for missile systems and
radars.
UAV // Unmanned Aerial Vehicle – An aerial vehicle that is being flown autonomously or
remotely, with no human pilot onboard, such as reconnaissance drones.
GEOSINT // Geospatial Intelligence – The use of satellite imaging to monitor activities such
as tracking individuals of interest, structural reconnaissance, military movement location
and tracking, and monitoring natural disasters.
FIN // Financially Motivated Threat Actor – The name given to financially motivated threat
actors by security and intelligence firm FireEye. These groups are typically associated with
cybercrime activity and practices.
UNC // Unclassified Threat Actor - Groups that are currently undergoing analysis are referred
to as “UNC” or Unclassified under the FireEye/Mandiant naming convention.