2.0 Threats, Vulnerabilities, and Mitigations Flashcards

1
Q

A person or entity responsible for an event that has been identified as a security incident or as a risk.

A

Threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The degree of access that a threat actor possesses before initiating an attack. An external threat actor has no standing privileges, while an internal actor has been granted some access permissions.

A

Internal/external

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A formal classification of the resources and expertise available to a threat actor.

A

Level of sophistication/capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Resources/funding

A

The ability of threat actors to draw upon funding to acquire personnel, tools, and development of novel attack types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A type of attack that compromises the availability of an asset or business process.

A

Service disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process by which an attacker copies data from a private network to an external network.

A

Data exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of attack that falsifies an information resource that is normally trusted by others.

A

Disinformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Demanding payment to prevent the release of information.

A

Blackmail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Demanding payment to prevent or halt some type of attack.

A

Extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Falsifying records, such as an internal fraud that involves tampering with accounts.

A

Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Often used to refer to someone who breaks into computer systems or spreads viruses. Ethical hackers prefer to think of themselves as experts on and explorers of computer security systems.

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A hacker operating with malicious intent.

A

Unauthorized hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A hacker engaged in authorized penetration testing or other security consultancy.

A

Authorized hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An inexperienced attacker that typically uses tools or scripts created by others.

A

Unskilled attacker/script kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A threat actor that is motivated by a social issue or political cause.

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.

A

Advanced persistent threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A type of threat actor that is supported by the resources of its host country’s military and security services.

A

Nation-state actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A type of threat actor that uses hacking and computer fraud for commercial gain.

A

Organized crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A type of threat actor who is assigned privileges on the system that cause an intentional or unintentional incident.

A

Internal threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A threat actor that causes a vulnerability or exposes an attack vector without malicious intent.

A

Unintentional or inadvertent insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Computer hardware, software, or services used on a private network without authorization from the system owner.

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The end-to-end process of supplying, manufacturing, distributing, and finally releasing goods and services to a customer.

A

Supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Weakness in an application or OS that could be triggered accidentally or exploited intentionally to cause a security breach.

A

Vulnerable software

23
Q

An attack type that will entice a victim into using or opening a removable device, document, image, or program that conceals malware.

23
Configuration that exposes a large attack surface, such as through unnecessary open service ports, weak or no authentication, use of default credentials, or lack of secure communications/encryption.
Unsecure network
23
Product life cycle phase where mainstream vendor support is no longer available.
Unsupported systems
24
A social engineering tactic where a team communicates, whether directly or indirectly, a lie or half-truth in order to get someone to believe a falsehood.
Pretexting
24
An activity where the goal is to use deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines.
Social engineering
25
A social engineering attack where an attacker pretends to be someone they are not.
Impersonation
26
An email-based social engineering attack in which the attacker sends email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.
Phishing
27
A human-based attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services (VoIP).
Vishing
28
A form of phishing that uses SMS text messages to trick a victim into revealing information.
Smishing
29
An impersonation attack in which the attacker gains control of an employee's account and uses it to convince other employees to perform fraudulent actions.
Business email compromise
29
An attack in which an attacker registers a domain name with a common misspelling of an existing domain, so that a user who misspells a URL in a browser is taken to the attacker's website.
Typosquatting
29
A type of attack that redirects users from a legitimate website to a malicious one.
Pharming
30
An attack in which an attacker targets specific groups or organizations, discovers which websites they frequent, and injects malicious code into those sites.
Watering hole attack
31
Software that serves a malicious purpose, typically installed without the user's consent (or knowledge).
Malware
32
A malicious software program hidden within an innocuous-seeming piece of software.
Trojan
33
Software that cannot definitively be classed as malicious, but may not have been chosen or wanted by the user.
Potentially unwanted programs (PUPs)/potentially unwanted applications (PUAs)
34
Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.
Virus
34
A process executed without proper authorization from the system owner for the purpose of damaging or compromising the system.
Malicious process
35
A type of malware that replicates between processes in system memory and can spread over client/server network connections.
Worm
36
A lightweight block of malicious code that exploits a software vulnerability to gain initial access to a victim system.
Shellcode
37
An attacker's ability to obtain, maintain, and diversify access to network systems using exploits and malware.
Advanced persistent threat (APT)
38
Software that records information about a PC and its user. ______ is used to describe software that the user has acknowledged can record information about their habits.
Adware
39
Malicious software or hardware that can record user keystrokes.
Keylogger
40
A mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication.
Backdoor
41
Software that records information about a PC and its users, often installed without the user's consent.
Spyware
42
Malware that creates a backdoor remote administration channel to allow a threat actor to access and control the infected host.
Remote access Trojan (RAT)
43
A group of hosts or devices that has been infected by a control program called a bot, which enables attackers to exploit the hosts to mount attacks.
Botnet
43
A type of attack that subverts network security systems and policies to transfer data without authorization or detection.
Covert channel
43
Command and control (C2 or C&C)
Infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets.
44
A group communications protocol that enables users to chat, send private messages, and share files.
Internet Relay Chat (IRC)
45
Class of malware that modifies system files, often at the kernel level, to conceal its presence.
Rootkit
46
Malware that tries to extort money from the victim by blocking normal operation of a computer and/or encrypting the victim’s files and demanding payment.
Ransomware
47
Malware that hijacks computer resources to create cryptocurrency.
Crypto-mining
48
A malicious program or script that is set to run under particular circumstances or in response to a defined event.
Logic bomb