1.5 - Threat Actors and Vectors Flashcards
Define a Threat Actor.
The entity responsible for an event that has an impact on the safety of another entity.
Define Advanced Persistent Threat (APT).
When an attacker has made there way onto a network without being detected. I can take several months to detect them.
Define Insiders as a threat actor.
Individuals who have access to the network whether they are employees or contractors. Their attacks may not be as sophisticated, but they have insider knowledge and can focus down vulnerable systems.
Define Nation States as a threat actor.
Governments. They may try to damage other nations or organizations for their gain. They have massive resources and can do constant attacks. They are often an Advanced Persistent Threat (APT).
Define a Hacktivist as a threat actor.
A hacker who has a social or political agenda. Funding is often limited.
Define Script Kiddies as a threat actor.
Someone who runs pre-made scripts without any knowledge of what’s really happening. They can be internal or external. They often do not have funding.
Define Organized Crime as a threat actor.
Professional criminals who are motivated by money to hack. They can often hire the best to do the hacking. The crime is often very organized.
Define a Hacker as a threat actor.
An individual who is an expert with technology. Hackers can be authorized to work within a network for the better. Some are malicious for personal gain. Some hackers might be semi-authorized. They might find vulnerabilities without any intention of using them.
Define a Shadow IT as a threat actor.
Individuals or a group within an organization that start acting as an IT unit in order to get around roadblocks that the IT unit might have set up to prevent security issues. They can be a good thing, but they are most often not because they can waste time and money, lead to security risks and compliance issues, and make the organization more dysfunctional.
Define Competitors as a threat actor.
Other organizations competing with your organization. They could hack in an attempt to get an edge. They can steal customer lists, shut down competitors during an event, corrupt manufacturing databases, or take financial information.
Define an Attack Vector.
A method used by an attacker to gain access or infect the target.
Define Direct Access Attack Vectors.
An attacker physically attacks a system. They can plug in a key logger or modify an OS. They can do a DoS by just unplugging the PC or server.
List some ways that an attacker could attack a Wireless network.
1) Default login Credentials
2) Rogue Access Point
3) Evil Twin
4) Wireless security protocol vulnerabilities
List some ways that an attacker could attack Email.
1) Phishing attacks
2) Deliver malware to user via message
3) Social Engineering
List some ways that an attacker could attack a Supply Chain.
1) Tamper with the underlying infrastructure
2) Gain access to a network using a vendor
3) Malware can modify the manufacturing process
4) Counterfeit networking equipment