1.5 - 1.8 Flashcards
Threat actors and attributes
Entity responsible for an event that has an impact on the safety of another entity
Advanced persistent threat (apt)
Hacktivist
Hacker with purpose, such as political agenda or social change
Very specific hacks, message or theme.
Usually not financial gain involved
Script kiddies
Runs premade Scripts not really full of technical knowledge. Hoping one of many scripts will work
Hackers
Authorized ethical hackers
Unauthorized hackers For malicious was
Semi authoriZed finds vulnerability but doesn’t take advantage
Of it
Going rogue
Instead of IT giving approval, we go rogue and do techniques to work around road blocks
Attack vectors
Gain access to infected target.. finding just on vulnerability
Wireless attack vectors
Default login needs to change
Rogue access needs to be closed
Evil twins or man in the middle with on path need to be destroyed
Use latest tech
Email vector attacks
Phishing malware or social engineering, invoice scams
Supply chain attack vector
Each step in the supply chain is an attack vector
Social media attack vectors
Using on one info against you via profiling and getting ur questions
Fake friends
Removal media attack vectors
Usb with malicious software Can also act like a Keyboard and can exfiltrate a lot of data even terabytes
Cloud attack vector
Public facing apps can be made with miss configuration
Bruteforce , or denial of service or orchestration attacks
Threat Intel
Research, decisions based on intel, via open source materials on the internet, gov or internet sources
Needs constant threat monitoring
Vulnerability databases
Common vulnerability and exposure where researchers go in study and make the data bases more secure
See at national vulnerability database
Automated indicator sharing
Automating the dissemination of threat Intel
Stix
Structured threat information expression
Describes cyber threat info including motivations abilities capabilities and response info
And uses Taxii to share stix securely. Trusted automated exchange of indicator information
Indicator of compromise
Indicator that someone is on your network , an event and the time roughly
Indicators-
Unusual amount of traffic
Change in hash values
Unusual network activity
Changes in dns
Uncommon logins
Spikes of read requests
Predictive analysis
To understand where hackers are focusing efforts such as real-time dns query analysis, real time traffic patterns with location data.
Combining these can create a basic forecast
Inference about data rather then on signature