1.5 Threat Actors, Vectors & Intelligence Sources Flashcards
Define Advanced Persistent Threat (APT)
An advanced threat designed to infiltrate a network, stay there without detection, and perform a specific malicious action
Example of an APT
A worm
Define Insider Threat Actors
- Threat agent has direct and potentially authorized access
- May intentionally or unintentionally facilitate an attack or breach
- Can be an internal employee or an external person who gains internal physical access
Define State Threat Actors
- Nation state or government based
- External
- Have significant resources to wage an all-out-war attack
- Can be an act or war or done to influence policy of another nation
Define Hacktivist threat actors
- A hacker/activist with a specific agenda
- External
- Can be very sophisticated, but often lack funding
- Intent/Motivation is to send a political or social message
Define Script Kiddies threat actors
- An unsophisticated attacker who downloads attacks from the Internet
- External
- Unsophisticated, lacks funding
- Motivation is notoriety or self-satisfaction of breaching an organization
Define Criminal Syndicates threat actors
- Organized crime hires hackers for financial gain
- External
- Sophisticated, well-funded
- Motivation is financial gain
Define Authorized Hackers
AKA Ethical hackers, given permission to analyze and penetrate a network to identify and strengthen any weak points
Define Un-Authorized Hackers
Malicious hackers who breach networks without permission seeking to cause damage or steal information
Define Semi-Authorized Hackers (2)
- Hackers who breach networks without permission, or malicious intent
- Often done as a type of personal research, but doesn’t take advantage of the targets
Define Shadow IT
When employees bypass the IT Dept to implement their own technology solutions without approval or authorization
Examples of Shadow IT (2)
- Using a web-application not approved for company use by IT
- Bringing personal equipment to use on the job without IT approval
Define Competitors threat actors
- A competitor organization
- External
- Sophisticated, well-funded
- Motivation is damage the business or its reputation to gain a competitive edge
Define Attack Vector
Method or vulnerability used by an attacker to breach a network or computer
7 most common Attack Vectors
- Direct access
- Wireless
- Supply chain
- Social Media
- Removable media
- Cloud