1.5 Explain different threat actors, vectors, and intelligence sources Flashcards

1
Q

Actors and threats
-Advance persistent threat (APT)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Actors and threats
-Insider threats

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Actors and threats
-State actors

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Actors and threats
-Hacktivists

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Actors and threats
-Script kiddies

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Actors and threats
-Criminal syndicates

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Actors and threats
-Hackers authorized/unauthorized/semi-authorized

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Actors and threats
-Shadow IT

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Actors and threats
-Competitors

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attributes of actors
-Internal/external

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attributes of actors
-Level of sophistication/capability

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attributes of actors
-Resources/funding

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attributes of actors
-Intent/motivation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vectors
-Direct Access

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vectors
-Wireless

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vectors
-Email

A
17
Q

Vectors
-Supply chain

A
18
Q

Vectors
-Social Media

A
19
Q

Vectors
-Removable media

A
20
Q

Vectors
-Cloud

A
21
Q

Threat intelligence sources
-OSINT

A
22
Q

Threat intelligence sources
-Closed/proprietary

A
23
Q

Threat intelligence sources
-Vulnerability databases

A
24
Q

Threat intelligence sources
-Public/private information-sharing centers

A
25
Q

Threat intelligence sources
-Dark web

A
26
Q

Threat intelligence sources
-Indicators of compromise

A
27
Q

Threat intelligence sources
-Automated Indicator Sharing (AIS)/Structured Thread Information eXpression (STIX/Trusted Automated eXchange of Intelligence Information (TAXII)

A
28
Q

Threat intelligence sources
-Predicitve analysis

A
29
Q

Threat intelligence sources
-Threat maps

A
30
Q

Threat intelligence sources
-File/code repositories

A
31
Q

Research sources
-Vendor websites

A
32
Q

Research sources
-Vulnerability feeds

A
33
Q

Research sources
-Conferences

A
34
Q

Research sources
-Academic journals

A
35
Q

Research sources
-Request for comments (RFC)

A
36
Q

Research sources
-Local industry groups

A
37
Q

Research sources
-Socail media

A
38
Q

Research sources
-Threat feeds

A