2.0 Threats, Vulnerabilities, and Mitigations Flashcards

1
Q

A person or entity responsible for an event that has been identified as a security incident or as a risk.

A

Threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The degree of access that a threat actor possesses before initiating an attack. An external threat actor has no standing privileges, while an internal actor has been granted some access permissions.

A

Internal/external

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A formal classification of the resources and expertise available to a threat actor.

A

Level of sophistication/capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Resources/funding

A

The ability of threat actors to draw upon funding to acquire personnel, tools, and development of novel attack types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A type of attack that compromises the availability of an asset or business process.

A

Service disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process by which an attacker copies data from a private network to an external network.

A

Data exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of attack that falsifies an information resource that is normally trusted by others.

A

Disinformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Demanding payment to prevent the release of information.

A

Blackmail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Demanding payment to prevent or halt some type of attack.

A

Extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Falsifying records, such as an internal fraud that involves tampering with accounts.

A

Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Often used to refer to someone who breaks into computer systems or spreads viruses. Ethical hackers prefer to think of themselves as experts on and explorers of computer security systems.

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A hacker operating with malicious intent.

A

Unauthorized hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A hacker engaged in authorized penetration testing or other security consultancy.

A

Authorized hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An inexperienced attacker that typically uses tools or scripts created by others.

A

Unskilled attacker/script kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A threat actor that is motivated by a social issue or political cause.

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.

A

Advanced persistent threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A type of threat actor that is supported by the resources of its host country’s military and security services.

A

Nation-state actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A type of threat actor that uses hacking and computer fraud for commercial gain.

A

Organized crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A type of threat actor who is assigned privileges on the system that cause an intentional or unintentional incident.

A

Internal threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A threat actor that causes a vulnerability or exposes an attack vector without malicious intent.

A

Unintentional or inadvertent insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Computer hardware, software, or services used on a private network without authorization from the system owner.

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The end-to-end process of supplying, manufacturing, distributing, and finally releasing goods and services to a customer.

A

Supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Weakness in an application or OS that could be triggered accidentally or exploited intentionally to cause a security breach.

A

Vulnerable software

23
Q

An attack type that will entice a victim into using or opening a removable device, document, image, or program that conceals malware.

A

Lure

23
Q

Configuration that exposes a large attack surface, such as through unnecessary open service ports, weak or no authentication, use of default credentials, or lack of secure communications/encryption.

A

Unsecure network

23
Q

Product life cycle phase where mainstream vendor support is no longer available.

A

Unsupported systems

24
Q

A social engineering tactic where a team communicates, whether directly or indirectly, a lie or half-truth in order to get someone to believe a falsehood.

A

Pretexting

24
Q

An activity where the goal is to use deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines.

A

Social engineering

25
Q

A social engineering attack where an attacker pretends to be someone they are not.

A

Impersonation

26
Q

An email-based social engineering attack in which the attacker sends email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.

A

Phishing

27
Q

A human-based attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services (VoIP).

A

Vishing

28
Q

A form of phishing that uses SMS text messages to trick a victim into revealing information.

A

Smishing

29
Q

An impersonation attack in which the attacker gains control of an employee’s account and uses it to convince other employees to perform fraudulent actions.

A

Business email compromise

29
Q

An attack in which an attacker registers a domain name with a common misspelling of an existing domain, so that a user who misspells a URL in a browser is taken to the attacker’s website.

A

Typosquatting

29
Q

A type of attack that redirects users from a legitimate website to a malicious one.

A

Pharming

30
Q

An attack in which an attacker targets specific groups or organizations, discovers which websites they frequent, and injects malicious code into those sites.

A

Watering hole attack

31
Q

Software that serves a malicious purpose, typically installed without the user’s consent (or knowledge).

A

Malware

32
Q

A malicious software program hidden within an innocuous-seeming piece of software.

A

Trojan

33
Q

Software that cannot definitively be classed as malicious, but may not have been chosen or wanted by the user.

A

Potentially unwanted programs (PUPs)/potentially unwanted applications (PUAs)

34
Q

Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.

A

Virus

34
Q

A process executed without proper authorization from the system owner for the purpose of damaging or compromising the system.

A

Malicious process

35
Q

A type of malware that replicates between processes in system memory and can spread over client/server network connections.

A

Worm

36
Q

A lightweight block of malicious code that exploits a software vulnerability to gain initial access to a victim system.

A

Shellcode

37
Q

An attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.

A

Advanced persistent threat (APT)

38
Q

Software that records information about a PC and its user. ______ is used to describe software that the user has acknowledged can record information about their habits.

A

Adware

39
Q

Malicious software or hardware that can record user keystrokes.

A

Keylogger

40
Q

A mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication.

A

Backdoor

41
Q

Software that records information about a PC and its users, often installed without the user’s consent.

A

Spyware

42
Q

Malware that creates a backdoor remote administration channel to allow a threat actor to access and control the infected host.

A

Remote access Trojan (RAT)

43
Q

A group of hosts or devices that has been infected by a control program called a bot, which enables attackers to exploit the hosts to mount attacks.

A

Botnet

43
Q

A type of attack that subverts network security systems and policies to transfer data without authorization or detection.

A

Covert channel

43
Q

Command and control (C2 or C&C)

A

Infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets.

44
Q

A group communications protocol that enables users to chat, send private messages, and share files.

A

Internet Relay Chat (IRC)

45
Q

Class of malware that modifies system files, often at the kernel level, to conceal its presence.

A

Rootkit

46
Q

Malware that tries to extort money from the victim by blocking normal operation of a computer and/or encrypting the victim’s files and demanding payment.

A

Ransomware

47
Q

Malware that hijacks computer resources to create cryptocurrency.

A

Crypto-mining

48
Q

A malicious program or script that is set to run under particular circumstances or in response to a defined event.

A

Logic bomb