1.5 Threat Actors & 1.6 Types of Vulnerabilities Flashcards
What is a Threat Actor?
A threat actor also called a malicious actor, is an entity that is partially or wholly responsible for an incident that impacts - or has the potential to impact – an organization’s security.
What is Advanced Persistent Threat (APT)
Groups of attackers who are highly motivated, funded, skilled, and patient. APTs are funded by nation-states (i.e governments) and organized crime. An APT often takes advantage of unknown flaws and zero-day exploits and tries to remain stealthy throughout the attack.
What is are Insider Threats?
An insider threat is a disgruntled employee who might have been overlooked for promotion and their relationship with their company has gone sour. ex. Edward Snowden
What are Nation-State Actors?
It is another country that poses a threat; their motivation is that they want to undermine another nation.
What is a Hacktivist?
It is an external threat that defaces your website or breaks into your computer or network. They are politically motivated. Ex. Anonymous
What is a Script Kiddie?
It is an individual who uses scripts or software written by someone else to exploit or break into a computer system.
What are Criminal Syndicates?
A loose affiliation of gangsters in charge of organized criminal activities.
Hacker Types: What is a White Hat Hacker?
(Authorized) A hacker discovers and exposes security flaws in applications and operating systems with an organization’s consent so that they can be fixed before they become widespread problems.
Hacker Types: What is a Black Hat Hacker?
(UnAuthorized) A hacker discovers and exposes security vulnerabilities without organizational consent, for financial gain, or for some malicious purpose.
Hacker Types: What is a Grey Hat Hacker?
(Semi-Authorized) A hacker who exposes security flaws in applications and operating systems without consent, but not ostensibly for malicious purposes.
What is Shadow IT?
It refers to information technology systems developed by departments other than the central IT department, to work around the shortcomings of the central information systems.
What are Competitors?
A competitor is another company in the same industry
as your company who tries to gain information from you on new products in the hope that they can build it faster and get it to market before you.
Attributes of Actors: Level of Sophistication
Several components must be considered here, including technical ability, financial means, access, political and social support, and persistence.
Attributes of Actors: Internal/External
Threats can be internal or external to the organization, or might even come from a partner.
Attributes of Actors: Resources/Funding
Although not all attacks are financially motivated, money can play a role in an attack.
Attributes of Actors: Intent/Motivation
The threat could be malicious, with the aim to destroy data or steal information or tangible property.
What are Attack Vectors?
Attack vectors are the methods that adversaries use to breach or infiltrate your network.
Attack Vector- Direct Access
Physically connecting to the target or target network via Cat-5, a machine left unlocked, or line tap
Attack Vector- Wireless
Exploiting insecure Wi-Fi, radio signals, Bluetooth, NFC, or other means without having to be physically connected.
Attack Vector- Email
Exploitation or misuse of electronic mail. This method is usually in the form of Phishing.
Attack Vector- Supply Chain
An organization’s vendors, outside contractors, and customers can be exploited.
Attack Vector- Removable Media
Any kind of electronic device which can be connected to your computing and network infrastructure can be used to attack it.
Attack Vector- Social Media
Attackers will target personal information, create false identities. or take over trusted accounts to gain valuable information.
Attack Vector- Cloud
Attackers will target poorly configured cloud services to access private environments. Many times, poor configurations come from a lack of understanding between vendor and user.