threat vector, attack vector

Cybersecurity Essentials


Types of Threat Intelligence

Threat Intelligence can be classified into four key categories based on its purpose, audience, and level of detail:

  1. Strategic Threat Intelligence
  2. Tactical Threat Intelligence
  3. Technical Threat Intelligence
  4. Operational Threat Intelligence

1. Strategic Threat Intelligence

Definition:

Purpose:

Key Characteristics:

Examples:

How It's Used:

2. Tactical Threat Intelligence

Definition:

Purpose:

Key Characteristics:

Examples:

How It's Used:

3. Technical Threat Intelligence

Definition:

Purpose:

Key Characteristics:

Examples:

How It's Used:

4. Operational Threat Intelligence

Definition:

Purpose:

Key Characteristics:

Examples:

How It's Used:

Comparison Table: Strategic vs. Tactical vs. Technical vs. Operational Threat Intelligence

Type Purpose Audience Timeframe Examples
Strategic High-level analysis of cyber threats & trends Executives, CISOs, policymakers Long-term (months/years) Nation-state cyber warfare, industry threat reports
Tactical Attack patterns, TTPs, and security defenses Security teams, SOC analysts Mid-term (weeks/months) MITRE ATT&CK analysis, malware behavior reports
Technical Indicators of Compromise (IoCs) Automated security tools (SIEM, EDR, IDS) Short-term (days/weeks) Malware hashes, phishing domain lists, botnet IPs
Operational Real-time attack tracking Incident response teams, SOC analysts Immediate (minutes/hours) Active ransomware attack alerts, dark web tracking

Phases of a Cyber Attack

Cyber attacks typically follow these five phases:

  1. Footprinting – Gathering information about the target (e.g., scanning public databases, using Google Dorking).
  2. Scanning – Identifying vulnerabilities using tools like Nmap, Nessus, or Shodan.
  3. Gaining Access – Exploiting vulnerabilities using malware, phishing, or brute-force attacks.
  4. Maintaining Access – Installing backdoors or rootkits to ensure persistent access.
  5. Covering Tracks – Deleting logs and masking activities to avoid detection.
Example

Sony Pictures Hack (2014) – A case study where North Korean hackers breached Sony’s systems, leaked confidential data, and destroyed files.


Sources of Threat Intelligence

Threat intelligence comes from various sources:


Impacts of a Cyber Attack

Cyber attacks can have severe consequences: