1.5 Explain different threat actors, vectors, and intelligence sources Flashcards

1
Q

Actors and threats
-Advance persistent threat (APT)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Actors and threats
-Insider threats

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Actors and threats
-State actors

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Actors and threats
-Hacktivists

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Actors and threats
-Script kiddies

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Actors and threats
-Criminal syndicates

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Actors and threats
-Hackers authorized/unauthorized/semi-authorized

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Actors and threats
-Shadow IT

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Actors and threats
-Competitors

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attributes of actors
-Internal/external

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attributes of actors
-Level of sophistication/capability

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attributes of actors
-Resources/funding

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attributes of actors
-Intent/motivation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vectors
-Direct Access

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vectors
-Wireless

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vectors
-Email

17
Q

Vectors
-Supply chain

18
Q

Vectors
-Social Media

19
Q

Vectors
-Removable media

20
Q

Vectors
-Cloud

21
Q

Threat intelligence sources
-OSINT

22
Q

Threat intelligence sources
-Closed/proprietary

23
Q

Threat intelligence sources
-Vulnerability databases

24
Q

Threat intelligence sources
-Public/private information-sharing centers

25
Q

Threat intelligence sources
-Dark web

26
Q

Threat intelligence sources
-Indicators of compromise

27
Q

Threat intelligence sources
-Automated Indicator Sharing (AIS)/Structured Thread Information eXpression (STIX/Trusted Automated eXchange of Intelligence Information (TAXII)

28
Q

Threat intelligence sources
-Predicitve analysis

29
Q

Threat intelligence sources
-Threat maps

30
Q

Threat intelligence sources
-File/code repositories

31
Q

Research sources
-Vendor websites

32
Q

Research sources
-Vulnerability feeds

33
Q

Research sources
-Conferences

34
Q

Research sources
-Academic journals

35
Q

Research sources
-Request for comments (RFC)

36
Q

Research sources
-Local industry groups

37
Q

Research sources
-Socail media

38
Q

Research sources
-Threat feeds