1.5 Different threat actors, vectors and intelligence sources Flashcards
Advanced persistent threat (APT)
This describes state actors that hack into either foreign governments or corporations
Insider threat
This is when an employee, contractor vendor or any other individual with authorized access to information uses that access to attack the organization
state actors
Individuals that use cybersecurity attacks as a military weapon to achieve political advantage
Hacktivists
These individuals use hacking techniques to accomplish some activist goal. They are motivated by the greater good.
Script Kiddies
These are low skilled individuals that try to do some hacking but lack the knowledge to do anything significant. They borrow code from others to try and do damage.
Criminal syndicates
These people focus on the direct financial gain from an attack
hackers
There are many forms of hackers from white hat to black hat hackers all trying to find and exploit vulnerabilities.
authorized
These are white hat hackers that are allowed to go into an organizations software/apps and gather vulnerabilites
unauthorized
These are black hat hackers that do the same thing as white hat hackers but they are not authorized to attack, but instead do it for unauthorized purposes
semi-authorized
These are grey hat hackers who fall between a white hat and a black hat. they are not hired but they want to find vulnerabilities to inform their targets.
shadow IT
This is when individuals and groups seek out their own technology solutions.
Competitors
These people may engage in corporate espionage designed to steal sensitive information from your organization and use it to their advantage.
Direct access
Attackers may seek this by physically entering the organizations buildings. They do this by entering public areas of the building.
wireless
Attackers dont need to gain physical access to the network but may be able to access remotely outside the building
This is one of the most commonly exploited threat vectors. Phishing, spam and other email attacks occur here.