1.5 Threat Actors, Vectors, Intelligence Sources Flashcards
1
Q
Actor:
- Inside the organization
- Low sophistication but high institutional knowledge
- Extensive resources
A
Insiders
2
Q
Actor
- Governmental
- High sophistication
- Militaristic
- APT
A
Nation States
3
Q
Actor:
- Has a strong purpose for social change or agenda
- Can be sophisticated
- Limited funding
A
Hacktivists
4
Q
Actor:
- Uses pre-made scripts without any technical knowledge
- No sophistication or funding
- Often do it for the fun of it
A
Script Kiddies
5
Q
Actor:
- High sophistication
- Money motivated
- Highly illegal activities
- Highly organized
A
Organized Crime
6
Q
Actor:
- experts with technology
- Can be authorized or unauthorized to perform activities
A
Hacker
7
Q
Actor:
- Rogue team that circumvents IT department
- Unencumbered and can make quick progress
- Often leads to wasted time and money, security risks, and compliance issues
A
Shadow IT
8
Q
This is used to describe the general pathways that an attacker can access a system or send an attack.
A
Attack vector
9
Q
Vector:
- When an attacker is able to access a system directly via hardware
A
Direct access
10
Q
Vector:
- Often easily accessed by poor configuration such as default admin credentials or rogue access points
A
Wireless
11
Q
Vector:
- Most commonly exploited as it is the most successful
- Usually involves phishing attacks
A
12
Q
Vector:
- Compromise of vendor’s system which in turn creates a vulnerability for your organization
A
Supply Chain
13
Q
Vector:
- Vector commonly used to gather personal data to be used in other attacks
- Uses web applications such as Facebook and Twitter
A
Social Media
14
Q
Vector:
- Physical level attack vector that involves USB drives, external hard drives, and CDs
A
Removable media
15
Q
The process of researching threats and threat actors
A
threat intelligence