1.6 Flashcards
are typically state-sponsored attackers that are highly skilled and well-funded, and can carry out long-term attacks to achieve specific goals and remain undetected
APT Advanced persistent threats
Employees, contractors, or partners who have access to an organization’s systems or information and intentionally or accidentally misuse or disclose it
Insider Threats
Government entities or military forces that use cyberattacks for political, military, or economic purposes
State Actors
Activists or groups that use hacking techniques to promote a social or political cause or to protest against organizations or governments
Hacktivists
Individuals with limited technical skills who use pre-existing tools or exploit code to launch simple attacks without understanding the underlying mechanisms
Script Kiddies
Organized groups that conduct cyberattacks for financial gain, such as stealing sensitive information, ransomware attacks, or credit card fraud
Criminal Syndicates
Employees or contractors who are authorized to conduct penetration testing, vulnerability assessments, or other security testing on behalf of an organization
Authorized Hackers
Individuals or groups who conduct cyberattacks without permission or authority to do so, with the intent to gain access to sensitive data or cause harm to a system or network
Unauthorized Hackers
Individuals who have some level of permission to access a system or network, but use this access to carry out unauthorized actions or to gain access to sensitive data
Semi-Authorized Hackers
The use of unauthorized or unapproved applications or hardware by employees, which can pose a security risk if they are not properly secured or managed
Shadow IT
Business rivals or competitors who may use cyberattacks to gain a competitive advantage or to disrupt the operations of their competitors
Competitors
internal vs external
Internal actors are members of the organization, while external actors are not.
This refers to the actor’s knowledge and capabilities in carrying out a security breach.
Level of Sophistication
This refers to the actor’s access to financial resources, tools, and technology to facilitate a security breach.
Resources/Funding
This refers to the reason or goal behind the actor’s attempt to breach the system’s security.
Intent/Motivation
Attackers gain access to a system physically by bypassing or breaking through physical security measures.
Direct Access
Attackers exploit vulnerabilities in wireless networks to gain unauthorized access to a system.
wireless