1.5 Threat Actors & 1.6 Types of Vulnerabilities Flashcards

1
Q

What is a Threat Actor?

A

A threat actor also called a malicious actor, is an entity that is partially or wholly responsible for an incident that impacts - or has the potential to impact – an organization’s security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Advanced Persistent Threat (APT)

A

Groups of attackers who are highly motivated, funded, skilled, and patient. APTs are funded by nation-states (i.e governments) and organized crime. An APT often takes advantage of unknown flaws and zero-day exploits and tries to remain stealthy throughout the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is are Insider Threats?

A

An insider threat is a disgruntled employee who might have been overlooked for promotion and their relationship with their company has gone sour. ex. Edward Snowden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Nation-State Actors?

A

It is another country that poses a threat; their motivation is that they want to undermine another nation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Hacktivist?

A

It is an external threat that defaces your website or breaks into your computer or network. They are politically motivated. Ex. Anonymous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Script Kiddie?

A

It is an individual who uses scripts or software written by someone else to exploit or break into a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Criminal Syndicates?

A

A loose affiliation of gangsters in charge of organized criminal activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hacker Types: What is a White Hat Hacker?

A

(Authorized) A hacker discovers and exposes security flaws in applications and operating systems with an organization’s consent so that they can be fixed before they become widespread problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hacker Types: What is a Black Hat Hacker?

A

(UnAuthorized) A hacker discovers and exposes security vulnerabilities without organizational consent, for financial gain, or for some malicious purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hacker Types: What is a Grey Hat Hacker?

A

(Semi-Authorized) A hacker who exposes security flaws in applications and operating systems without consent, but not ostensibly for malicious purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Shadow IT?

A

It refers to information technology systems developed by departments other than the central IT department, to work around the shortcomings of the central information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Competitors?

A

A competitor is another company in the same industry
as your company who tries to gain information from you on new products in the hope that they can build it faster and get it to market before you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attributes of Actors: Level of Sophistication

A

Several components must be considered here, including technical ability, financial means, access, political and social support, and persistence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attributes of Actors: Internal/External

A

Threats can be internal or external to the organization, or might even come from a partner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attributes of Actors: Resources/Funding

A

Although not all attacks are financially motivated, money can play a role in an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attributes of Actors: Intent/Motivation

A

The threat could be malicious, with the aim to destroy data or steal information or tangible property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are Attack Vectors?

A

Attack vectors are the methods that adversaries use to breach or infiltrate your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Attack Vector- Direct Access

A

Physically connecting to the target or target network via Cat-5, a machine left unlocked, or line tap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Attack Vector- Wireless

A

Exploiting insecure Wi-Fi, radio signals, Bluetooth, NFC, or other means without having to be physically connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Attack Vector- Email

A

Exploitation or misuse of electronic mail. This method is usually in the form of Phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Attack Vector- Supply Chain

A

An organization’s vendors, outside contractors, and customers can be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Attack Vector- Removable Media

A

Any kind of electronic device which can be connected to your computing and network infrastructure can be used to attack it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Attack Vector- Social Media

A

Attackers will target personal information, create false identities. or take over trusted accounts to gain valuable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Attack Vector- Cloud

A

Attackers will target poorly configured cloud services to access private environments. Many times, poor configurations come from a lack of understanding between vendor and user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is Threat Intelligence Source?

A

Dedicated centers, databases, and technical specifications cataloging information about attacks (and attackers) to help understand past events and promote proactive defense

26
Q

What is Open-Source Intelligence (OSINT)?

A

The gathering of information from any publicly available resource. The process, techniques, and methodologies used to collect open-source intelligence can be called reconnaissance, information gathering, footprinting, fingerprinting, or target research in hacking methodologies.

27
Q

What are Closed/proprietary threat intelligence sources?

A

Require membership in a certain group such as a specific industry, government, or military. Also referred to as a vertical community threat intelligence. Many also require a paid membership or subscription. This latter type can be known as a commercial threat intelligence source.

28
Q

What are Vulnerability Databases?

A

Indexes and repositories of information about threats, exploits, and attacks. The two dominate examples are the Common Vulnerabilities and Exposures (CVE) hosted at cve.mitre.org and National Vulnerability Database (NVD) hosted as nvd.nist.gov

29
Q

What is CVE?

A

Common Vulnerabilities and Exposures

30
Q

What is NVD?

A

National Vulnerability Database

31
Q

What are Public/Private Information Sharing Centers?

A

Locations where you can post information about your own security compromise events as well as access information posted by others. A private information sharing center requires membership. Examples of public centers include Exploit Database at exploit-db.com and US-CERT at us-cert.gov. These centers are also known by the phrase Information Sharing and Analysis Centers (ISAC)

32
Q

What is the Dark Web?

A

The part of the internet that is only accessible by means of special software such as TOR, which can be used to redirect to a web browser to content hosted on hidden servers.

33
Q

What is the Deep Web?

A

The part of the “regular” Internet that is not searchable using a standard public search engine. Instead, this is the collection of data, information, and resources that is contained in a walled-garden. Estimates are that 95% of the content available online is in the deep web and therefore not indexed by the major search engines.

34
Q

What is a Walled Garden?

A

Separate networks from that of the Internet itself. Many walled-gardens grant easy access to their content, but you have to access through their own portal. One example of this are the US government databases that you can access through searchsystems.net. Some require that you have a valid account with them, such as Facebook and Twitter. While still others may require that you pay for a subscription or membership to access, such as Lexis-Nexus or Morningstar.

35
Q

What are indicators of compromise? (IoC)

A

Evidence that an intrusion or security breach has taken place. Some IoCs are entries in log files, others are the appearance of new files, others are changes to configurations, while others may be active on a network.

36
Q

What is Automated Indicator Sharing (AIS)?

A

An initiative by the Department of Homeland Security (DHS) to facilitate the open and free exchange of IoCs and other cyberthreat information between the US federal government and the private sector in an automated and timely manner. AIS makes full use of STIX and TAXII. It is managed by National Cybersecurity and Communications Integration Center (NCCIC)

37
Q

What is a Structured Threat Information Expression (STIX)?

A

A common language or format for describing cyber threat information so it can be shared, stored, and otherwise used in a consistent manner that facilitates automation. STIX is for anyone involved in defending networks or systems against cyber threats, including cyber defenders, cyber threat analysts, malware analysts, security tool vendors, security researchers, threat sharing communities, and more.

38
Q

What is a Trusted Automated Exchange Of Intelligence Information (TAXII)?

A

The main transport mechanism for cyber threat information is represented in STIX. Through the use of TAXII services, organizations can share cyber threat information in a secure and automated manner. As a standardized set of communication services, protocols, and message exchanges TAXII helps organizations exchange STIX information related to IoCs.

39
Q

What is Predictive Analysis?

A

Employs IoCs, observables, and other cyber threat intelligence to determine when an attack is imminent. The earlier in the cyber kill chain that we can detect an attack, exploit, breach, or intrusion even, the more likely the malicious event will be deflected and stopped. Bots/agents are used to respond in near real-time to mitigate the impending threat.

40
Q

What are Threat Maps?

A

A “real-time” map of cyber attacks that are taking place. These are also called cyber threat maps, cyber-attack maps, and DoS maps. Most threat maps are animated and can provide a wealth of detail in their presentation. You should explore a few threat maps to see what they have to offer.

41
Q

What are File/Code Repositories?

A

Storage locations used by programmers to organize and structure their development efforts, such as GitHub. However, these same services can support the crafting of malicious tools, exploits, and malware.

42
Q

What are Research Sources?

A

A security manager, chief information security officer (CISO), chief security officer (CSO), or just a security administrator needs to be knowledgeable about the current state of security

43
Q

Research Sources: Vendor Websites

A

A useful source of security information related to updates, patches, and fixes for their product. However, it is rare for a vendor to publish information about vulnerabilities and security issues of their product for which there is not a current patch to fix.

44
Q

Research Sources: Vulnerability Feeds

A

List weaknesses, attack points, and compromise issues

45
Q

Research Sources: Conferences

A

Collaborative meetings both in-person and virtually

46
Q

Research Sources: Request for Comments (RFC)

A

Documents drafted by the technical community that defines, describe, and prescribe technology specifications.

47
Q

Research Sources: Threat Feeds

A

Another term for a vulnerability feed

48
Q

Research Sources: Tactics, techniques, and procedures (TTP)

A

The collection of information about the means, motivations, and opportunities related to APTs. TTP is often used in establishing attribution (i.e assigning responsibility) of an attack to a specific hacker, group, or APT.

49
Q

What is a Vulnerability?

A

Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack. A vulnerability may also refer to any type of weakness in a computer system itself, in a set of procedures, or in anything that leaves information security exposed to a threat.

50
Q

What is Cloud-Based Vulnerability?

A

A deployment concept where an organization contracts with a third-party cloud provider. The cloud provider owns, operates, and maintains the hardware and software. The organization pays a monthly fee to use the cloud solution.

51
Q

What is On-Premise Vulnerability?

A

The traditional deployment concept is in which an organization owns the hardware licenses the software, and operates and maintains the systems on its own, usually within its own building.

52
Q

What is a Zero Day?

A

Newly discovered attacks for which there is no specific defense available from the vendor of the vulnerable product. A zero-day exploit aims to exploit flaws or vulnerabilities in targeted systems that are unknown or undisclosed to the world in general.

53
Q

What are Weak Configurations?

A

Weak configurations can be devastating to institutions holding large amounts of (sensitive) data such as financial service firms.

54
Q

Examples of Weak Configurations

A
  • Open Permissions: These are defaults from the vendor and they have not been set to restrict or deny access or access controls.
  • Unsecure root accounts: A root account should be limited to local keyboard logon only.
  • Errors: Refers to the anticipation, detection, and resolution of programming, application, and communication errors.
  • Weak Encryption: An encryption/decryption algorithm that uses a key of insufficient length.
  • Unsecure Protocols: It is any protocol that does not provide authenticity, integrity, and confidentiality.
  • Default settings: An option offered to you, which is either recommended or safe to choose if you’re not sure. Defaults are intended for ease of installation and initial configuration to minimize support calls from new customers.
  • Open ports and services: Open ports can be dangerous when the service listening on the port is misconfigured, unpatched, or has poor rules.
55
Q

What is Third-Party Risk?

A

It is the potential threat presented to organizations’ employee and customer data, financial information, and operations from the organization’s supply chain and other outside parties that provide products and/or services and have access to privileged systems.

56
Q

Examples of Third-Party Risk

A
  • Vendor Management: It is the process of fully identifying all of the significant companies that aid in the delivery of a product or service to your organization, or to your customers, on behalf of the organization.
  • System Integration: It is the process of connecting different sub-systems (components) into a single larger system that functions as one.
  • Lack of vendor support: It occurs when the vendor does not provide any improvements, support, or patching/upgrading of the product after the initial sale.
  • Supply chain: It is the activities required by the organization to deliver goods or services to the consumer
  • Outsourced code development: It takes place when companies choose to have custom code solutions developed by a third party.
  • Data storage: It is the collective methods and technologies that capture and retain digital information on electromagnetic, optical, or silicon-based storage media.
57
Q

What is Improper or Weak Patch Management?

A
  • Patch management is applying new or changing existing code to a software program. It stems from enhancements to bug fixes and in today’s world it’s more popularly associated with security fixes.
  • Effective patch management has become more complex with time as the threat landscape is more sophisticated. Thus, investment firms are encouraged to regularly monitor their infrastructure and implement prompt fixes as necessary.
58
Q

Examples of Improper or Weak Patch Management

A
  • Firmware: It is a specific class of computer software that provides low-level control for a device’s specific hardware.
  • Operating System (OS): It is system software that manages computer hardware, software resources, and provides common services for computer programs.
  • Application: It is computing software designed to carry out a specific task other than one relating to the operation of the computer itself, typically to be used by end-users.
59
Q

What is a Legacy Party Platform?

A

A legacy party platform, also called a legacy operating system, is an operating system (OS) no longer in widespread use, or that has been supplanted by an updated version of earlier technology.

  • Many enterprises that use computers have legacy platforms, as well as legacy applications, that serve critical business needs.
60
Q

What is an Impact Vulnerability?

A

An impact can be best described as the type of vulnerability that describes the type of harm an attack could cause if the vulnerability were exploited. For example, if an intrusion takes place, then there are consequences and impacts that must be survived, handled, and managed.

61
Q

Examples of Impacts

A
  • Data Loss: It occurs when sensitive, confidential, proprietary, or personal data is stolen by an attacker.
  • Data breaches: It is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.
  • Data exfiltration: It occurs when malware and/or a malicious actor carries out an unauthorized data transfer from a computer.
  • Identity theft: It is a crime of obtaining the personal or financial information of another person to use their identity to commit fraud
  • Financial: It can be described as any security breach that will cause an increase in financial expenses as the issue is resolved.
  • Reputation: It is the potential loss of financial capital, social capital, and/or market share resulting from damage to a firm’s reputation.
  • Availability loss: It is the final component of the CIA Triad and refers to the actual availability of your data.