1.5 Explain different threat actors, vectors, and intelligence sources Flashcards
Actors and threats
-Advance persistent threat (APT)
Actors and threats
-Insider threats
Actors and threats
-State actors
Actors and threats
-Hacktivists
Actors and threats
-Script kiddies
Actors and threats
-Criminal syndicates
Actors and threats
-Hackers authorized/unauthorized/semi-authorized
Actors and threats
-Shadow IT
Actors and threats
-Competitors
Attributes of actors
-Internal/external
Attributes of actors
-Level of sophistication/capability
Attributes of actors
-Resources/funding
Attributes of actors
-Intent/motivation
Vectors
-Direct Access
Vectors
-Wireless
Vectors
-Email
Vectors
-Supply chain
Vectors
-Social Media
Vectors
-Removable media
Vectors
-Cloud
Threat intelligence sources
-OSINT
Threat intelligence sources
-Closed/proprietary
Threat intelligence sources
-Vulnerability databases
Threat intelligence sources
-Public/private information-sharing centers
Threat intelligence sources
-Dark web
Threat intelligence sources
-Indicators of compromise
Threat intelligence sources
-Automated Indicator Sharing (AIS)/Structured Thread Information eXpression (STIX/Trusted Automated eXchange of Intelligence Information (TAXII)
Threat intelligence sources
-Predicitve analysis
Threat intelligence sources
-Threat maps
Threat intelligence sources
-File/code repositories
Research sources
-Vendor websites
Research sources
-Vulnerability feeds
Research sources
-Conferences
Research sources
-Academic journals
Research sources
-Request for comments (RFC)
Research sources
-Local industry groups
Research sources
-Socail media
Research sources
-Threat feeds