1.6 Flashcards

1
Q

are typically state-sponsored attackers that are highly skilled and well-funded, and can carry out long-term attacks to achieve specific goals and remain undetected

A

APT Advanced persistent threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Employees, contractors, or partners who have access to an organization’s systems or information and intentionally or accidentally misuse or disclose it

A

Insider Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Government entities or military forces that use cyberattacks for political, military, or economic purposes

A

State Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Activists or groups that use hacking techniques to promote a social or political cause or to protest against organizations or governments

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Individuals with limited technical skills who use pre-existing tools or exploit code to launch simple attacks without understanding the underlying mechanisms

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Organized groups that conduct cyberattacks for financial gain, such as stealing sensitive information, ransomware attacks, or credit card fraud

A

Criminal Syndicates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Employees or contractors who are authorized to conduct penetration testing, vulnerability assessments, or other security testing on behalf of an organization

A

Authorized Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Individuals or groups who conduct cyberattacks without permission or authority to do so, with the intent to gain access to sensitive data or cause harm to a system or network

A

Unauthorized Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Individuals who have some level of permission to access a system or network, but use this access to carry out unauthorized actions or to gain access to sensitive data

A

Semi-Authorized Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The use of unauthorized or unapproved applications or hardware by employees, which can pose a security risk if they are not properly secured or managed

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business rivals or competitors who may use cyberattacks to gain a competitive advantage or to disrupt the operations of their competitors

A

Competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

internal vs external

A

Internal actors are members of the organization, while external actors are not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This refers to the actor’s knowledge and capabilities in carrying out a security breach.

A

Level of Sophistication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This refers to the actor’s access to financial resources, tools, and technology to facilitate a security breach.

A

Resources/Funding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This refers to the reason or goal behind the actor’s attempt to breach the system’s security.

A

Intent/Motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attackers gain access to a system physically by bypassing or breaking through physical security measures.

A

Direct Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attackers exploit vulnerabilities in wireless networks to gain unauthorized access to a system.

A

wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Attackers use phishing or other social engineering techniques to gain access to a system through email.

A

email vulnerabilioty

19
Q

Attackers exploit vulnerabilities in the supply chain to gain access to a system by targeting third-party vendors.

A

supply chain

20
Q

Attackers use social media to gain access to a system through social engineering techniques or phishing attacks.

A

social media

21
Q

Attackers gain access to a system by introducing malware or other malicious code via removable media such as USB drives or CDs.

A

removable media

22
Q

cloud vulnberabilities

A

Attackers exploit vulnerabilities in cloud-based systems to gain unauthorized access to sensitive data.

23
Q

Publicly available information gathered from sources such as news articles, social media, or other online resources.

A

osint

24
Q

Intelligence sources that are available only to a specific organization or group and are not publicly available.

A

closed/propitery

25
Q

Publicly available databases of known vulnerabilities in hardware, software, and applications that can be used to identify potential threats.

A

Vulnerability Databases

26
Q

Organizations or groups that share information about threats and vulnerabilities among themselves and with trusted partners.

A

Public and Private Information Sharing Centers

27
Q

Part of the internet that is not indexed by traditional search engines, and is often used for illegal activities, including the sale of stolen data and tools for hacking.

A

Dark Web

28
Q

Specific pieces of data that are associated with a security breach or attack and can be used to identify the presence of a threat.

A

Indicators of Compromise (IOCs)

29
Q

Automated systems for sharing IOCs among organizations and partners to facilitate faster detection and response to threats.

A

Automated Indicator Sharing (AIS)

30
Q

A standard language for sharing threat intelligence that provides a consistent and structured format for organizing and exchanging threat information.

A

STIX (Structured Threat Information Expression)

31
Q

A protocol for exchanging IOCs and other threat intelligence that enables automated sharing and integration with security systems.

A

TAXII (Trusted Automated Exchange of Indicator Information)

32
Q

The use of historical data, statistical models, and machine learning algorithms to identify patterns and predict future security threats.

A

Predictive Analysis

33
Q

Visual representations of real-time or historical data that illustrate the geography and scope of cyber threats, such as the location and frequency of attacks.

A

Threat Maps

34
Q

Public or private repositories of code, software, or other files that may contain vulnerabilities or be used as tools for hacking.

A

File/Code Repositories

35
Q

Websites of software, hardware, and other technology vendors that provide information about products and services, including security updates, patches, and vulnerability disclosures.

A

Vendor Websites

36
Q

Feeds of information about newly discovered vulnerabilities in software, hardware, and other systems, which are often provided by vendors or other security researchers.

A

Vulnerability Feeds

37
Q

Events where security researchers, vendors, and other experts share information about emerging threats, best practices, and new technologies related to information security.

A

Conferences

38
Q

Peer-reviewed publications that provide in-depth research and analysis of topics related to information security, including trends, threats, and solutions.

A

Academic Journals

39
Q

Technical documents published by the Internet Engineering Task Force (IETF) that provide guidelines, standards, and recommendations for internet protocols and other networking technologies.

A

Request for Comments (RFCs)

40
Q

Organizations or groups of professionals who work in the same industry or geographic location, and who share information and collaborate on security-related issues.

A

Local Industry Groups

41
Q

Platforms such as Twitter, LinkedIn, and other social networks that are used by security professionals to share news, updates, and insights about emerging threats and best practices.

A

Social Media

42
Q

Real-time or near-real-time streams of information about threats, including indicators of compromise (IOCs) and other relevant data that can be used to identify and respond to potential threats.

A

Threat Feeds

43
Q

Information about the methods, tools, and techniques used by threat actors to carry out attacks, including information on specific threat groups, their motivations, and their preferred attack vectors.

A

Adversary Tactics, Techniques, and Procedures