1.5 Explain different threat actor, vectors and intelligence sources Flashcards

1
Q

Someone who takes action.

A

Actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A potential harm.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The person or entity who is responsible for causing any security violating incidents.

A

Threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attacker who is operating on behalf of their country’s government, military, or other powerful leadership.

A

State actor/ nation-state hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Someone who uses their hacking skills for a cause or purpose.

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat actors who are less knowledgeable than a professional skilled attacker.

A

Script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Someone skilled and knowledgeable in a system.

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An ethical hacker or skilled IT professional.

A

Authorized hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A criminal or malicious attacker.

A

Unauthorized hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Possibly a reformed criminal or a skilled IT professional operating undercover to perform ethical hacking.

A

Semi-authorized hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A term used to describe the IT components deployed by a department without the knowledge or permission of senior management or the IT group.

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat and attack vectors

A

Direct access, wireless, networking, email, supply chain, social media, people, removable media, mobile devices, IoT, embedded devices, remote access, and cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The collection of information about threat actors and the threats they represent.

A

Threat intelligence sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The gathering of information from any publicly available resource.

A

Open-source intelligence (OSINT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The part of the Internet which is not accessible by a standard Internet connection.

A

Dark web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Evidence that an intrusion or security breach has taken place.

A

Indicators of compromise

17
Q

An initiative by the DHS to facilitate the open and free exchange of IoCs and other cyberthreat information between the US federal government and the private sector in an automated and timely manner.

A

Automated indicator sharing (AIS)

18
Q

A standardized language and repetitional structure for the organization and dissemination of cyberthreat indicators and related information.

A

Structured threat information expression (STIX)

19
Q

A standardized set of communication services, protocols, and message exchanges to support the effective communication and exchange of cyberthreat indicators.

A

Trusted automated exchange of intelligence information (TAXII)

20
Q

The collection of information about the means, motivations, and opportunities related to APTs.

A

Tactics, techniques, and procedures (TTP)