mitre att&ck framework interview questions

MITRE ATT&CK Framework – Knowledge base of attacker tactics and techniques.

In my own experience, the most common questions are going to be:
  • What is an SQL injection? …
  • What is Phishing? …
  • What is a DDoS, what is a DoS and their differences.? …
  • What is a Port Scan?

IT is famous for its skill shortages, whether real or perceived. That’s particularly true in IT security, a field where hiring managers and recruiters have long bemoaned a lack of available talent.

(ISC)2’s 2020 Cybersecurity Workforce Study estimates that there will be 3.1 unfilled positions worldwide this year. That’s down from 4 million the previous year, but it’s still a huge number.

The U.S. Bureau of Labor Statistics estimates the number of employed information security analysts alone will grow 31 percent between 2019 and 2029. If it’s not already apparent, that’s much faster than the average for all occupations, according to BLS.

Numbers like these mean lots of hiring on the horizon – and many interviews, even if most of those interviews are conducted remotely for the foreseeable future.

Mitre Attack Framework Interview Question

11. Can you differentiate between Incident Response and Threat Hunting? Threat hunting is a hypothesis-driven process that involves looking for threats that have slipped through the cracks and are now lurking in the network. Incident response is a reactive approach that occurs when an intrusion detection system recognizes an issue and creates an alert, whereas threat hunting is a proactive strategy.

12. What is proactive Threat Hunting? The process of proactively exploring across networks or datasets to detect and respond to sophisticated cyberthreats that circumvent standard rule, or signature-based security controls is known as proactive threat hunting.

Over time, threat hunting and incident response approaches have improved. Advanced methodologies are being used by organizations to identify risks by using professional threat hunters even before damage or loss occurs. Our Threat Hunting Professional Online Training Course enhances your abilities and assists you in comprehending threats and their goals.

9. Tell me something about the Threat Hunt hypothesis? A threat hunting hypothesis is a theory or proposed interpretation based on minimal data from a secure environment. It is then used as a jumping-off point for further inquiry.

15. What is data leakage? Data leakage is defined as the separation or departure of a data packet from the location where it was supposed to be kept in technical terms, particularly as it relates to the threat hunter.

Weve been keeping the worlds most valuable data out of enemy hands since 2005 with our market-leading data security platform.

Michael has worked as a sysadmin and software developer for Silicon Valley startups, the US Navy, and everything in between.

What is in the MITRE ATT&CK Matrix?

The MITRE ATT&CK matrix contains a set of techniques used by adversaries to accomplish a specific objective. Those objectives are categorized as tactics in the ATT&CK Matrix. The objectives are presented linearly from the point of reconnaissance to the final goal of exfiltration or “impact”. Looking at the broadest version of ATT&CK for Enterprise, which includes Windows, macOS, Linux, PRE, Azure AD, Office 365, Google Workspace, SaaS, IaaS, Network, and Containers, the following adversary tactics are categorized:

  • Reconnaissance: gathering information to plan future adversary operations, i.e., information about the target organization
  • Resource Development: establishing resources to support operations, i.e., setting up command and control infrastructure
  • Initial Access: trying to get into your network, i.e., spear phishing
  • Execution: trying the run malicious code, i.e., running a remote access tool
  • Persistence: trying to maintain their foothold, i.e., changing configurations
  • Privilege Escalation: trying to gain higher-level permissions, i.e., leveraging a vulnerability to elevate access
  • Defense Evasion: trying to avoid being detected, i.e., using trusted processes to hide malware
  • Credential Access: stealing accounts names and passwords, i.e., keylogging
  • Discovery: trying to figure out your environment, i.e., exploring what they can control
  • Lateral Movement: moving through your environment, i.e., using legitimate credentials to pivot through multiple systems
  • Collection: gathering data of interest to the adversary goal, i.e., accessing data in cloud storage
  • Command and Control: communicating with compromised systems to control them, i.e., mimicking normal web traffic to communicate with a victim network
  • Exfiltration: stealing data, i.e., transfer data to cloud account
  • Impact: manipulate, interrupt, or destroy systems and data, i.e., encrypting data with ransomware
  • Within each tactic of the MITRE ATT&CK matrix there are adversary techniques, which describe the actual activity carried out by the adversary. Some techniques have sub-techniques that explain how an adversary carries out a specific technique in greater detail. The full ATT&CK Matrix for Enterprise from the MITRE ATT&CK navigator is represented below:

    MITRE ATT&CK for Enterprise, 2021

    8 top security job interview questions

    We asked a group of security leaders and practitioners to share with us some of their top interview questions at the moment. What are interviewers looking for when they pose these questions to security job candidates?

    Of course, we also asked for some tips on how to develop good answers, or what they’re looking for when they pose these questions to candidates. You can use these in your interview prep if you’re on the job market. (Obviously, specific questions will vary by role, interviewer, and organization – but these will give you a foundation.) And if you’re the hiring manager, you can consider these from that point of view.

    FAQ

    What is MITRE ATT&CK framework used for?

    The MITRE ATT&CK™ framework is a comprehensive matrix of tactics and techniques designed for threat hunters, defenders and red teams to help classify attacks, identify attack attribution and objective, and assess an organization’s risk.

    How many techniques are in MITRE ATT&CK?

    mitre att&ck Techniques

    There are 185 primary techniques and about 367 techniques, including sub-techniques under the Enterprise matrix.

    What is TTP in MITRE ATT&CK?

    A growing body of evidence from industry, MITRE, and government experimentation confirms that collecting and filtering data based on knowledge of adversary tactics, techniques, and procedures (TTPs) is an effective method for detecting malicious activity.

    What are the tactics of the ATT&CK framework?

    ATT&CK defines the following tactics used in a cyberattack:
    • Initial Access.
    • Execution.
    • Persistence.
    • Privilege Escalation.
    • Defense Evasion.
    • Credential Access.
    • Discovery.
    • Lateral Movement.

    Related Posts

    Leave a Reply

    Your email address will not be published. Required fields are marked *