1.3 Explain Threat Actorsd Flashcards

1
Q

Threat Actor

A

A threat actor is the person of entity who is responsible for causing or controlling any security-violating incident experienced by an organization or individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Script Kiddies

A

Script kiddies are threat actors who are less knowledgable than a professional skilled actor. They usually unable to program their own attack tools and many may not understand exactly what how the attack operates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacktivist

A

Someone who uses their hacking skills for a cause or purpose. A hacktivist commits criminal activities to further their cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

APT

A

Advance persistent threat is any form of cyberattacks that is able to continually exploit a target over a considerable period of time. AN ATP often takes advantage of flaws not publicly known or tries to maintain stealth throughout the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk presented by insiders

A

One

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Understand how organized crime is involved in cybercrime.

A

Organized crime is involved in cybercrime activities because it is yet another area of exploitation that may allow them to gain access, power, or money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Understand how nation-states are using cyberattacks.

A

Most nation-states are now using cyberattacks as yet another weapon in their arsenal against their real or perceived enemies, whether internal or outside their borders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

risks presented by competitors.

A

While it is widely known that such actions are illegal, many organizations still elect to perform corporate espionage and sabotage against their competition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

risks presented by internal and external threat actors.

A

Threats can originate from inside your organization as well as outside. All too often, companies focus most of their analysis and security deployment efforts on external threats without providing sufficient attention to the threats originating from inside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Understand threat actors’ level of sophistication.

A

Threat actors can vary greatly as to their skill level and level of sophistication. Some attackers are highly trained professionals who are applying their education to malicious activities, whereas others are simply bad guys who learned how to perform cyberattacks just to expand their existing repertoire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Know how threat actors access resources and funding.

A

Some threat actors are well funded with broad resources; others are not. Some threat actors self-fund, whereas others find outside investors or paying customers. Self-funded threat actors might highjack or use advertisement platforms to obtain funds; others may use ransomware to extort money from their victims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Understand threat actors’ intent and motivation.

A

The intent or motivation of an attacker can be unique to the individual or may be similar to your own. Some attackers are motivated by the obvious benefits of money and notoriety. Others attack from boredom or just to prove to themselves that they can.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Understand open-source intelligence.

A

Open-source intelligence is the gathering of information from any publicly available resource. This includes websites, social networks, discussion forums, file services, public databases, and other online sources. It also includes non-Internet sources, such as libraries and periodicals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly