1.5 Explain different threat actors, vectors, and intelligence sources Flashcards

1
Q

Advanced persistent threat (APT)

A

Highly motivated group of attackers funded by a nation state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Insider threat

A

Someone on the inside of an org. violating company security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State actor

A

Attacker operating on behalf of nation state

Generally is an APT group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hacktivist

A

Using hacking skills for a cause/purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Script kiddies

A

Threat actor less knowledgeable than a skilled attacker, usually uses tools with little understanding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Criminal syndicate

A

Organized cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of hackers

A

White hat
-Authorized hacker, for testing

Black hat
-Unauthorized hacker, malicious

Gray hat
-Semi-authorized hacker, under cover for ethical hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shadow IT

A

Term used to describe IT components deployed by a department w/o knowledge or permission of senior mgt or IT group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Competitors

A

Another type of threat actor related to business or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attributes of actors

A

Internal/external

Level of sophistication/capability

Resources/funding

Intent/motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vectors

A

Path/means by which an attack gains access to a target to cause harm

Direct access

Wireless

Email

Supply chain

Social media

Removable media

Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Open source intelligence (OSINT)

A

Gathering of info from publicly available sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vulnerability databases

A

Indexes/repositories of info about threats, exploits, and attacks

Example:
Common Vulnerabilities and Exposures (CVE)
National Vulnerability Database (NVD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Public/private information sharing centers

A

Locations where info about security compromise events are posted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dark web

A

Part of internet not accessible by standard users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Indicators of compromise (IOCs)

A

Evidence of intrusion or breach

17
Q

Automated indicator sharing (AIS)

A

Initiative by Department of Homeland Security to facilitate exchange of IoCs and other cyberthreat info between Gov. and Private sectors automatically

18
Q

Structured threat information exchange (STIX)/Trusted automated exchange of indicator information (TAXII)

A

Effort to develop standard language and structure for cyberthreat indicators and related info

19
Q

Predictive analysis

A

Using IoCs and other observables to attempt to predict an attack

20
Q

Threat maps

A

Real time map of cyber attacks taking place

21
Q

Request for commends (RFC)

A

Document drafted by technical community defining technology specs

22
Q

Adversary tactics, techniques, and procedures (TTP)

A

Collection of info on means, motivations, and opportunities related to APTs