1.5Threat actor types and attributes Flashcards

1
Q

Script kiddies

A

A person who uses preexisting code and scripts to hack into machines, because they lack the expertise to write their own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hactivist

A

Anindividual who is someone who misuses computer systems for a socially or politically motivated agenda, they have no roots in the hacker culture and ethics. Hacker on a mission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Organized crime

A

These are professionals motivated ultimately by profit. they have enough money to buy the best gear and tech. Multiple people perform specific toles: gathering data, managing exploits, and one who actually writes the code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nation States/APT

A

an APT is an advanced persistent threat, these are massive security risks that can cost companies and countries millions of dollars. Nation states have very sophisticated hacking teams that can target the security of other nations. They often attack military organizations or large security sites, they also frequently attack power plants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Insiders

A

Someone who is inside the company who has intricate knowledge of the company and how its network works. They can pinpoint a specific vulnerability and may even have access to multiple parts of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Competitors

A

Rival companies, can bring down your network or steal information through espionage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internal/External

A

Internal is inside the company and can be intentional, unintentional, or social reasons. External is someone outside the company trying to get in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Level of sophistication

A

Is the skill of the hacker and the complexity of the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Resources/funding

A

The amount of money and the value of the tech and gear being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intent/motivation

A

The reason for the attack, can be for political, monetary, or social reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Use of open source intelligence(OSINT)

A

Data that is collected through publicly available information. This can be used to help make decisions. Can be used by threat actors to help find their next target or how to best attack their target. OSINT is also incredibly helpful for mitigating risks and identifying new threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly