2 Cybersecurity Threat Landscape Flashcards
What are the four major criteria for classifying threat actors? (ISAM)
- Internal vs. external
- Level of sophistication and capability
- Available resources and funding
- Motivations and levels of intent
What types of threat actors may pose an insider threat?
Employees and other users
What are some common motivations for attackers?
- Data exfiltration
- Espionage
- Service disruption
- Blackmail
- Financial gain
- Philosophical or political beliefs
- Revenge
- Disruption and chaos
- War
True or False: Hacktivists primarily seek financial gain.
False
What are some methods attackers use to gain initial access to an organization?
- Remote access over the Internet
- Wireless connections
- Direct physical access
- Email or social media approaches
- Removable media
- Cloud services
- Supply chain interference
What is the role of threat intelligence in organizations? Provides….
Provides insight into the threat landscape
Fill in the blank: Attackers may exploit different _______ to gain initial access to an organization.
[vectors]
What should security teams monitor for regarding supply chain risks? Risks posed by..
Risks posed by outsourced code development, cloud data storage, and integration between external and internal systems
What are some characteristics of simplistic threat actors?
Unskilled attackers using exploit code written by others
What distinguishes advanced persistent threats?
They are posed by nation-state actors and organized crime
What techniques can be used for vendor management to protect the supply chain?
Techniques that protect against attackers compromising external links into an organization’s network
True or False: Security teams rely solely on external threat intelligence sources.
False
What is a potential risk associated with the use of shadow IT systems?
Exposure of data to risk
What may motivate some attackers to believe they are acting ethically?
They may believe they are acting in the best interests of society
What is a key focus for security professionals regarding external vendors? Monitoring for…
Monitoring for supply chain risks