I Hack I Conquer
search
⌘Ctrlk
I Hack I Conquer
  • Welcome to Aleš Tománek's notes on Cyber
  • Certificates & Badges
  • Enumeration
  • LINUX
  • Windows
  • Cisco Networking Academy
  • TryHackMe.com Cyber Security 101
  • NCFE L3 Cyber - Assignments and Feedback
    • UNIT 1 | Understanding cyber security principles
    • UNIT 2 | Threat intelligence in cyber security
      • 1. Identify key concepts of cyber threat intelligence (AC 1.1)
      • 2. Explain the following terms in relation to cyber security (AC 1.2)
      • 3. Describe the threat intelligence lifecycle (AC 1.3)
      • 4. Describe how to find out about emerging attack techniques and how to recognise them (AC 1.4)
      • 5. Consider what could be included in Open Source Intelligence data sets (AC 1.5)
      • 6. Explain why it is important to only use reliable and valid sources of Open Source Intelligence in
      • 7. Explain the importance of using reliable sources of information in relation to cyber security thr
      • 8. Consider the current threat status and make possible recommendations based upon cyber threat inte
      • 9. Analyse relevant cyber threat intelligence information requirements for an organisation (AC 1.9)
      • 10. Describe a range of threat models (AC 2.1)
      • 11. Explain the steps within a threat model (AC 2.2)
      • 12. Evaluate a threat model (AC 2.3)
      • 13. Identify types of malicious software (AC 3.1)
      • 14. Describe the effects of different types of malicious software on an infected system (AC 3.2)
      • 15. Describe the motives for using specific malicious software attacks (AC 3.3)
      • 16. Identify how specific malicious software attacks are made more effective due to human factors (A
      • 17. Explain the term ‘social engineering’ (AC 4.1)
      • 18. Give examples of how Open Source Intelligence can be used for social engineering (AC 4.2)
      • 19. Describe ways a social engineering attack could take place (AC 4.3)
    • UNIT3 | Cyber security testing, vulnerabilities and controls
    • UNIT 4 | Cyber security incident response
    • UNIT 5 | Understand legislation and ethical conduct within cyber security
    • UNIT 6 | Professional skills and behaviours for cyber security
  • OU Cyber Foundations
  • Python - 100 Days of Code: The Complete Python Pro Bootcamp - Notes
  • Random Experiments
  • Unsorted notes on everything
  • Contact me
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. NCFE L3 Cyber - Assignments and Feedbackchevron-right
  2. UNIT 2 | Threat intelligence in cyber security

10. Describe a range of threat models (AC 2.1)

Previous9. Analyse relevant cyber threat intelligence information requirements for an organisation (AC 1.9)chevron-leftNext11. Explain the steps within a threat model (AC 2.2)chevron-right