2 Cybersecurity Threat Landscape Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four major criteria for classifying threat actors? (ISAM)

A
  • Internal vs. external
  • Level of sophistication and capability
  • Available resources and funding
  • Motivations and levels of intent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What types of threat actors may pose an insider threat?

A

Employees and other users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some common motivations for attackers?

A
  • Data exfiltration
  • Espionage
  • Service disruption
  • Blackmail
  • Financial gain
  • Philosophical or political beliefs
  • Revenge
  • Disruption and chaos
  • War
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: Hacktivists primarily seek financial gain.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some methods attackers use to gain initial access to an organization?

A
  • Remote access over the Internet
  • Wireless connections
  • Direct physical access
  • Email or social media approaches
  • Removable media
  • Cloud services
  • Supply chain interference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the role of threat intelligence in organizations? Provides….

A

Provides insight into the threat landscape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fill in the blank: Attackers may exploit different _______ to gain initial access to an organization.

A

[vectors]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What should security teams monitor for regarding supply chain risks? Risks posed by..

A

Risks posed by outsourced code development, cloud data storage, and integration between external and internal systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some characteristics of simplistic threat actors?

A

Unskilled attackers using exploit code written by others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What distinguishes advanced persistent threats?

A

They are posed by nation-state actors and organized crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What techniques can be used for vendor management to protect the supply chain?

A

Techniques that protect against attackers compromising external links into an organization’s network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: Security teams rely solely on external threat intelligence sources.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a potential risk associated with the use of shadow IT systems?

A

Exposure of data to risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What may motivate some attackers to believe they are acting ethically?

A

They may believe they are acting in the best interests of society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a key focus for security professionals regarding external vendors? Monitoring for…

A

Monitoring for supply chain risks