1.5 Threat Actors, Vectors & Intelligence Sources Flashcards

1
Q

Define Advanced Persistent Threat (APT)

A

An advanced threat designed to infiltrate a network, stay there without detection, and perform a specific malicious action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Example of an APT

A

A worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Insider Threat Actors

A
  1. Threat agent has direct and potentially authorized access
  2. May intentionally or unintentionally facilitate an attack or breach
  3. Can be an internal employee or an external person who gains internal physical access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define State Threat Actors

A
  1. Nation state or government based
  2. External
  3. Have significant resources to wage an all-out-war attack
  4. Can be an act or war or done to influence policy of another nation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Hacktivist threat actors

A
  1. A hacker/activist with a specific agenda
  2. External
  3. Can be very sophisticated, but often lack funding
  4. Intent/Motivation is to send a political or social message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Script Kiddies threat actors

A
  1. An unsophisticated attacker who downloads attacks from the Internet
  2. External
  3. Unsophisticated, lacks funding
  4. Motivation is notoriety or self-satisfaction of breaching an organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Criminal Syndicates threat actors

A
  1. Organized crime hires hackers for financial gain
  2. External
  3. Sophisticated, well-funded
  4. Motivation is financial gain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Authorized Hackers

A

AKA Ethical hackers, given permission to analyze and penetrate a network to identify and strengthen any weak points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Un-Authorized Hackers

A

Malicious hackers who breach networks without permission seeking to cause damage or steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Semi-Authorized Hackers (2)

A
  1. Hackers who breach networks without permission, or malicious intent
  2. Often done as a type of personal research, but doesn’t take advantage of the targets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Shadow IT

A

When employees bypass the IT Dept to implement their own technology solutions without approval or authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Examples of Shadow IT (2)

A
  1. Using a web-application not approved for company use by IT
  2. Bringing personal equipment to use on the job without IT approval
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Competitors threat actors

A
  1. A competitor organization
  2. External
  3. Sophisticated, well-funded
  4. Motivation is damage the business or its reputation to gain a competitive edge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Attack Vector

A

Method or vulnerability used by an attacker to breach a network or computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

7 most common Attack Vectors

A
  1. Direct access
  2. Wireless
  3. Email
  4. Supply chain
  5. Social Media
  6. Removable media
  7. Cloud
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Open-source Intelligence

A

Researching new threats through open sources, such as the Internet and discussion groups, social media sites, or government sites

17
Q

Define Closed/Proprietary intelligence

A

Companies that research and provide compiled security threat information for a cost

18
Q

Define Vulnerability Databases as source of threat intelligence

A

Publicly available databases of vulnerabilities and threats

19
Q

Define CVE, who sponsors it, and where it is found

A
  1. Common Vulnerabilities and Exposures database
  2. Sponsored by Dept of Homeland Security (DHS) and Cybersecurity and Infrastructure Security Agency (CISA)
  3. Published as the Us National Vulnerability Database (NVC) on the NIST website
20
Q

Define public/private information sharing centers

A

Can be public government sites, private sites, or a membership-based organization that researches and shares data about threats and vulnerabilities

21
Q

What is the Cyber Threat Intelligence (CTA)?

A

Membership-based organization that provides the sharing and evaluation of network traffic to determine if there is an active threat or attack

22
Q

Define Automated Indicator Sharing (AIS)

A

the process to process and transfer threat information securely between organizations over the Internet

23
Q

Define Structured Threat Information eXpression (STIX)

A

a standardized format to transfer threat information details

24
Q

Define TAXII

A

A secure, trusted transport to exchange STIX over public networks

25
Q

Define Darkweb

A
  1. Private websites hosted on the Internet that require specialized software to access
  2. A source used by hackers for illegal activity, such as hacking techniques and selling of information gathered illegally
26
Q

Define Indicator of Compromise (IOC)

A

Abnormal activity outside of “normal” that may indicate a breach or attack

27
Q

4 examples of Indicators of Compromise (IOC)

A
  1. Increase in specific network traffic
  2. Changes to static files
  3. User logins at odd times of day
  4. DNS record changes
28
Q

Define Predictive analysis

A

Using machine learning or AI to apply statistical algorithms to historical network data to detect and prevent cyber attacks in real-time

29
Q

Define Threat Maps

A

A visual perspective of the sources and destinations of real-time attacks available online

30
Q

2 ways that file/code repositories are a source of information

A
  1. Sometimes the source code of the tools hackers might use for an attack are available publicly and provide insight into vulnerabilities hackers might use
  2. Threat agents monitor code/file repositories for source code that might be accidentally made public, instead of private, to gain insight into system vulnerabilities
31
Q

How are vendor-sites a good source of threat research?

A

The vendors of software/hardware are often the first to know of vulnerabilities in their products and often publish these on their websites with patches

32
Q

How are vulnerability feeds useful to stay updated on new threats?

A

Many organizations publish vulnerability feeds, such as the CVE by the NIST, that can be monitored and filtered for new threats relevant to software/hardware used by an organization

33
Q

What is the benefit of conferences on staying up to date with security threats and vulnerabilities?

A

Researchers present new threat/vulnerability information, can network and learn from peoples’ experience in the field of security

34
Q

How can academic journals provide valuable threat/vulnerability information?

A

Academic journals offer deep dives into various security technologies and how previous threats worked in detail

35
Q

How are RFCs (request for comment) relevant to threat/vulnerability information?

A

RFCs provide a deep understanding of how a technology works as well as vulnerabilities that exist within those standards

36
Q

How are local industry groups (such as a Microsoft or Cisco user group) a valuable source of information?

A

They provide valuable technical information on how various vendor products work to help better understand how to apply security policies and secure configurations

37
Q

How can social media be a source of information on threats/vulnerabilities?

A

Vendors and hacker groups might post information on newly discovered threats or active attacks on social media

38
Q

Describe what a threat feed is

A

Many organizations, such as the US DHS and FBI, post feeds with current information about newly emerging threats that is important to monitor

39
Q

Define adversarial Tactic, Technique and Procedure (TTP)

A

provides an understanding of how attackers are penetrating networks in order to recognize active attacks on your network