2.0 Threats, Vulnerabilities, and Mitigations Flashcards
A person or entity responsible for an event that has been identified as a security incident or as a risk.
Threat actor
The degree of access that a threat actor possesses before initiating an attack. An external threat actor has no standing privileges, while an internal actor has been granted some access permissions.
Internal/external
A formal classification of the resources and expertise available to a threat actor.
Level of sophistication/capability
Resources/funding
The ability of threat actors to draw upon funding to acquire personnel, tools, and development of novel attack types.
A type of attack that compromises the availability of an asset or business process.
Service disruption
The process by which an attacker copies data from a private network to an external network.
Data exfiltration
A type of attack that falsifies an information resource that is normally trusted by others.
Disinformation
Demanding payment to prevent the release of information.
Blackmail
Demanding payment to prevent or halt some type of attack.
Extortion
Falsifying records, such as an internal fraud that involves tampering with accounts.
Fraud
Often used to refer to someone who breaks into computer systems or spreads viruses. Ethical hackers prefer to think of themselves as experts on and explorers of computer security systems.
Hacker
A hacker operating with malicious intent.
Unauthorized hacker
A hacker engaged in authorized penetration testing or other security consultancy.
Authorized hacker
An inexperienced attacker that typically uses tools or scripts created by others.
Unskilled attacker/script kiddie
A threat actor that is motivated by a social issue or political cause.
Hacktivist
An attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.
Advanced persistent threat (APT)
A type of threat actor that is supported by the resources of its host country’s military and security services.
Nation-state actors
A type of threat actor that uses hacking and computer fraud for commercial gain.
Organized crime
A type of threat actor who is assigned privileges on the system that cause an intentional or unintentional incident.
Internal threat
A threat actor that causes a vulnerability or exposes an attack vector without malicious intent.
Unintentional or inadvertent insider threat
Computer hardware, software, or services used on a private network without authorization from the system owner.
Shadow IT
The end-to-end process of supplying, manufacturing, distributing, and finally releasing goods and services to a customer.
Supply chain