1.5 Explain different threat actors, vectors, and intelligence sources Flashcards

1
Q

Threat Actor

A

The bad guy, the person or entity that is trying to hack you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack Vector

A

The method of hacking, how the threat actor hacks you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

APT

A

Advanced Persistent Threat, attackers in the network and stay there until taken out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Insiders Threats

A

Threat Actor that has access to your organization data because they work there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

State Actors

A

A threat actor that works for a government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hacktivist

A

a hacker with a purpose, a hacker that’s a activist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Script kiddies

A

threat actor that runs many scripts in hope that they gain access, not experienced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Criminal Syndicates

A

Professional criminals that have the resources to hack. motivated by money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hackers

A

people that are experts in technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authorized Hacker

A

ethical hacker with good intentions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unauthorized Hacker

A

hackers with malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Semi-authorized

A

Hackers that find vulnerabilities but don’t exploit it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Shadow IT

A

Organization that create there own IT functions. Causes security Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Competitors

A

Threat Actor that tries to cause a DoS to your company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Direct access Vector

A

Attacks vector that has direct access to your OS. Attaches keylogger to collect info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Email Vector

A

Threat Actor phishing, or deliver malware through email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Supply Chain Vector

A

Tampering with the manufacturing process

18
Q

Social Media Vector

A

Threat Actor that use your social media to gain information

19
Q

Removable Media Vector

A

Malicious USB, or uses USB to steal information

20
Q

Cloud Vector

A

Attacks the Cloud by exploiting misconfig., brute force, and cause a DoS.

21
Q

OSINT

A

Open Source Int
public info on cyber security from internet, gov data, social media, commercial

21
Q

Wireless Vector

A

Vectors that allow a threat Actor access to your network.
default login cred., Rouge Access point, Evil twin, weak encryption

22
Q

Closed/Proprietary

A

Threat Int. source that you pay for and is formatted to be understood easily

23
Q

Vulnerability Database

A

CVE and NVD are vulnerability data bases that researchers have found and published.

NVD provides scoring and tells solutions

24
Public/private Info-Sharing Centers
Public-federal gov. releases unclassified cyber attack info Private- Real time cyber info shared
25
AIS
Automated Indicator Sharing automictic way sharing threat information
26
STIX
Structured Threat Information eXpression Standardize way of detailing a cyber threat
27
TAXII
Transportation method for STIX data between orgainzations
28
Dark Web Intelligence
Hacking Groups and services that provides you with a "how to" and sells info for you to hack
29
Predictive Analysis
Finding suspicious behaviors such as: DNS queries, traffic patterns, and location data.
30
Threat Maps
A view of where threats are coming form
31
File/code Repositories
Public code that has been released, attackers get check repositories to see if source code was released
32
Vendor Websites
First one to know if their product was compromised
33
Vulnerability Feeds
Combines vulnerability databases and creates a central vul. feed.
34
Conference
Collected source of info. form people that researched, identified, experienced attacks.
35
Academic Journals
Detailed information on how someone delt with a attack
36
RFC
Track and create a set of standards everyone can use. also provide details of a threats and vulnerability
37
Local Industry Groups
Gathering of local peers to share info.
38
Social Media
Hacking groups that discuss vulnerabilities
39
Threat Feeds
Automated feed that alerts you of a threat
40
TTP
(Tactics, Technique, and procedure) How Threat Actors are hacking and how are they doing it.