2 Cybersecurity Threat Landscape Flashcards

1
Q

What are the attributes of threat actors (IE SC RF MI)

IES CR FMI

A

Threat actors differ in several key attributes. We can classify threat actors using four major criteria. First, threat actors may be internal to the organization, or they may come from external sources. Second, threat actors differ in their level of sophistication and capability. Third, they differ in their available resources and funding. Finally, different threat actors have different motivations and levels of intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What sources can threat actors come from? (6)

A

1) unskilled attackers using exploit code written by others,
2) quite sophisticated, such as the advanced persistent threat posed by nation-state actors and organized crime
3) Hacktivists may seek to carry out political agendas,
4) whereas competitors may seek financial gain.
5) Employees and other users may pose an insider threat by working from within to attack your organization.
6) The use of unapproved shadow IT systems may also expose your data to risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are motivations for Attackers? (9)

A

1) data exfiltration
2) espionage,
3) service disruption,
4) blackmail
5) financial gain
6) philosophical or political beliefs
7) revenge, disruption and
8) chaos, or war.
9) Some attackers may believe they are behaving ethically and acting in the best interests of society.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What vectors might Attackers exploit to gain initial access to an organization? (6) W P S M C S

A

1) remotely over the Internet, through a wireless connection,
2) or by attempting direct physical access. They may also approach employees over
3) email or social media.
4) Attackers may seek to use removable media to trick employees into unintentionally compromising their networks,
5) or they may seek to spread exploits through cloud services
6) Sophisticated attackers may attempt to interfere with an organization’s supply chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat intelligence provides organizations with valuable insight into the threat landscape. Where can Security teams may leverage threat intelligence from? (3) P&P I A

A

1) public and private sources to learn about current threats and vulnerabilities.
2) indicators of compromise and
3) predictive analytics on their own data

Threat intelligence teams often supplement open source and closed source intelligence that they obtain externally with their own research.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security teams must monitor for supply chain risks - what should they pay particular attention to?.

A

Security teams must monitor for supply chain risks. Modern enterprises depend on hardware, software, and cloud service vendors to deliver IT services to their internal and external customers. Vendor management techniques protect the supply chain against attackers seeking to compromise these external links into an organization’s network.

Security professionals should pay particular attention to risks posed by
1) outsourced code development,
2) cloud data storage, and
3) integration between external and internal systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

** techniques used for social engineering? **

A

1) Phishing
2) and its related techniques of smishing
3) and vishing seek to gain information using social engineering techniques.
4) Misinformation and disinformation campaigns are used to change opinions and to shift narratives.
5) Malicious actors will **impersonate **whomever they need to acquire information, to gain access or credentials, or to persuade individuals to take action.
6) Pretexting is often used with impersonation to provide a believable reason for the action or request.
7) Business email compromise and brand impersonation are both used to make malicious emails and other communications appear legitimate and thus more likely to fool targets into taking desired action.
8) Watering hole attacks focus on sites that target frequently visit, while
9) typosquatters rely on users who make typos while entering URLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are ways to aquire and crack passwords? (O, O, B

A

1) Password attacks can be conducted both online against live systems and
2) offline using captured password stores.
3) Brute-force attacks like spraying and dictionary attacks as well as password cracking can recover passwords in many circumstances.

4) Unencrypted or plain-text passwords and** improper or unsecure storage methods** like the use of MD5 hashes make attacks even easier for attackers who can access them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the main categories of cybersecurity threat actors?

A

Internal and External

Internal threats come from within the organization, while external threats originate from outside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the term APT stand for?

A

Advanced Persistent Threat

APTs are often linked to nation-state attackers and involve sophisticated, ongoing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who are white-hat hackers?

A

Authorized attackers who seek to discover and correct security vulnerabilities

They may be employees or contractors engaged in penetration testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a script kiddie?

A

A derogatory term for unskilled attackers who use automated tools for hacking

They often lack deep knowledge of hacking techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What motivates organized crime in cyber activities?

A

Illegal financial gain

Organized crime groups typically do not embrace political causes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is shadow IT?

A

The use of technology services not approved by the organization

This often happens when employees seek to meet business needs independently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What distinguishes hacktivists from other types of attackers?

A

They use hacking for activist goals and believe they are motivated by the greater good

Their activities may violate laws but are seen as justifiable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fill in the blank: APT attackers often conduct their own security vulnerability research in an attempt to discover _______.

A

[zero-day vulnerabilities]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are insider threats?

A

Attacks by individuals with authorized access to information and systems

Insiders may have varying skill levels and motivations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the primary focus of unskilled attackers?

A

Proving their skill by attacking convenient targets

They often target environments like schools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the characteristics of organized crime in cyber activities?

A
  • Motive: illegal financial gain
  • Skill level: moderately to highly skilled
  • Resources: more time and money than unskilled attackers

Organized crime groups are often involved in various cybercrime categories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which hacking group is most well-known for hacktivism?

A

Anonymous

They are known for collective decision-making regarding their agenda and targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or False: All gray-hat hacking is legal.

A

False

Gray-hat hacking can still lead to criminal charges despite good intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What can behavioral assessments help identify?

A

Insider attacks

Cybersecurity teams should collaborate with HR to detect unusual behaviors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a common tactic used by competitors for corporate espionage?

A

Using disgruntled insiders to steal sensitive information

Competitors may also purchase insider information on the dark web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Fill in the blank: APT attacks are characterized by _______ and _______ techniques.

A

[advanced] and [persistent]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a zero-day attack?

A

An attack that exploits vulnerabilities unknown to product vendors

These vulnerabilities lack available patches for correction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the primary goal of threat actors targeting an organization?

A

To gain access to the organization’s information or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define ‘attack surface.’

A

A system, application, or service that contains a vulnerability that threat actors might exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are ‘threat vectors’?

A

The means that threat actors use to obtain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the aim of security professionals regarding attack surfaces?

A

To reduce the size and complexity of the attack surface through effective security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

True or False: Phishing messages are a common example of a message-based threat vector.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Name three types of message-based attacks.

A
  • Phishing messages
  • Spam messages
  • Vishing attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is ‘vishing’?

A

Voice phishing attacks conducted via phone calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

How might attackers gain access to a wired network?

A

By physically entering the organization’s facilities and connecting to unsecured network jacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does physical access to a component imply for security professionals?

A

An attacker who can physically touch a component will likely be able to compromise that device.

36
Q

What is a significant risk associated with wireless networks?

A

Attackers can access the network from outside the organization’s facilities.

37
Q

Fill in the blank: Individual systems may serve as threat vectors depending on their _______.

A

configuration and software installed.

38
Q

What type of files may serve as threat vectors?

A

Files that contain embedded malicious code.

39
Q

How do attackers commonly use removable media as a threat vector?

A

By distributing USB drives hoping someone will plug them into their computer.

40
Q

What can attackers exploit in cloud services?

A

Files with improper access controls, security flaws, or accidentally published API keys.

41
Q

What is a common tactic used by sophisticated attackers in the supply chain?

A

Interfering with hardware or software providers to indirectly attack an organization.

42
Q

What is the challenge with supply chain attacks?

A

They involve risks that are difficult to anticipate and address.

43
Q

True or False: Ethical attacks are motivated by a desire to expose vulnerabilities and improve security.

44
Q

List four motivations behind cyberattacks.

A
  • Data exfiltration
  • Espionage
  • Service disruption
  • Financial gain
45
Q

What is the motivation behind hacktivist attacks?

A

Philosophical or political beliefs.

46
Q

Define ‘revenge attacks.’

A

Attacks motivated by a desire to get even with an individual or organization.

47
Q

What should organizations conduct periodically to assess threats?

A

Organizational threat assessments.

48
Q

What do attackers seek to do in service disruption attacks?

A

Take down or interrupt critical systems or networks.

49
Q

What are the implications of using legacy applications?

A

They may contain known vulnerabilities and are no longer supported by their vendor.

50
Q

What is threat intelligence?

A

The set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment.

51
Q

Why is building a threat intelligence program crucial for organizations?

A

It helps organizations understand current threats and build appropriate defenses.

52
Q

What can threat intelligence information be used for?

A

Predictive analysis to identify likely risks to the organization.

53
Q

What are some sources of threat intelligence?

A

Open source intelligence (OSINT), commercial services, proprietary intelligence.

54
Q

What do threat feeds provide?

A

Up-to-date details about threats, including technical details like IP addresses, hostnames, and CVE record numbers.

55
Q

What is the purpose of vulnerability databases in threat intelligence?

A

They help direct an organization’s defensive efforts and provide insight into discovered exploits.

56
Q

What are indicators of compromise (IoCs)?

A

Telltale signs that an attack has taken place, such as file signatures and log patterns.

57
Q

What is open source threat intelligence?

A

Threat intelligence acquired from publicly available sources.

58
Q

Name three sources of open source threat intelligence.

A
  • Senki.org
  • Open Threat Exchange
  • MISP Threat Sharing project
59
Q

True or False: The dark web uses standard Internet connections without encryption.

60
Q

What is the Tor browser used for?

A

Accessing the dark web.

61
Q

What is proprietary threat intelligence?

A

Threat intelligence created by commercial vendors or organizations that is not publicly available.

62
Q

Why might an organization use proprietary intelligence?

A

To keep threat data secret, sell or license it, or to protect methods and sources.

63
Q

What can happen if a threat feed fails?

A

Organizations may be exposed to threats due to outdated or unreliable information.

64
Q

What is a threat map?

A

A geographic view of threat intelligence providing real-time insights into the cybersecurity threat landscape.

65
Q

What factors should be assessed when evaluating threat intelligence?

A
  • Timeliness
  • Accuracy
  • Relevance
66
Q

What is a confidence score?

A

A summary metric that allows organizations to filter threat intelligence based on trust.

67
Q

Fill in the blank: The Structured Threat Information eXpression (STIX) is an _______.

A

[XML language]

68
Q

What does TAXII stand for?

A

Trusted Automated eXchange of Intelligence Information.

69
Q

What are Information Sharing and Analysis Centers (ISACs)?

A

Organizations that help infrastructure owners share threat information.

70
Q

When were ISACs introduced?

A

In 1998 as part of Presidential Decision Directive-63.

71
Q

What should security professionals do regarding emerging cybersecurity threats?

A

Conduct their own research using various sources.

72
Q

Name two sources for building a threat research toolkit.

A
  • Vendor security information websites
  • Academic journals and technical publications
73
Q

What are adversary tactics, techniques, and procedures (TTPs)?

A

Information on the methods and practices used by adversaries in cyber threats.

74
Q

What are some sources to consult for building a threat research toolkit?

A

Vendor security information websites, vulnerability and threat feeds, academic journals, professional conferences, social media accounts of security professionals

These sources provide valuable insights into current cybersecurity threats and best practices.

75
Q

What type of documents are RFC documents?

A

Technical specifications for Internet protocols

RFC stands for Request for Comments and these documents are crucial for understanding internet standards.

76
Q

What should you focus on when researching cybersecurity threats?

A

Adversary tactics, techniques, and procedures (TTPs)

Understanding TTPs helps improve threat intelligence programs.

77
Q

Fill in the blank: Learning more about the ways that attackers function allows you to improve your own _______.

A

threat intelligence program

78
Q

True or False: Academic journals and technical publications are irrelevant to cybersecurity threat research.

A

False

Academic journals and publications provide detailed insights and research findings.

79
Q

What must cybersecurity professionals understand to assess risks?

A

The threat landscape

Understanding the threat landscape is crucial for evaluating risks and necessary controls.

80
Q

How can cybersecurity threats be classified?

A

Based on:
* Internal or external status
* Level of sophistication and capability
* Resources and funding
* Intent and motivation

These classifications help in understanding the nature of the threats.

81
Q

What are the different forms of threat actors?

A

They include:
* Unsophisticated attackers
* Advanced nation-state actors
* Hacktivists
* Organized crime
* Competitors

Each type of actor has different motivations and methods.

82
Q

What is a common motivation for unsophisticated attackers?

A

The thrill of a successful hack

Unsophisticated attackers often act for personal satisfaction rather than financial gain.

83
Q

What are common threat vectors for cyberattacks?

A

Common vectors include:
* Email
* Social media
* Direct physical access
* Supply chain exploits
* Network-based attacks
* Other vectors

Understanding these vectors is essential for implementing effective security measures.

84
Q

What should organizations build to stay updated on threats?

A

Robust threat intelligence programs

These programs help organizations adapt their controls against emerging threats.

85
Q

True or False: Cybersecurity threats only come from external sources.

A

False

Threats can be internal or external, highlighting the need for comprehensive security measures.