2.1 Flashcards

Threat actors

1
Q

An entity responsible for an event that has an impact on the safety of another entity

A

Threat actor

AKA malicious actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 types of threat actor categorization

A

Internal/external
Resources/funding
Level of sophistication/capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A threat actor backed by governments/government agencies

Motivations of data exfiltration, philosophical, revenge, disruption, war

External

Often an APT

Very high sophistication

A

Nation state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A threat actor who runs pre-made scripts without any knowledge of what’s really happening

Motivated by the hunt - disruption, data exfiltration, sometimes philosophical

Can be internal or external

Not very sophisticated

No formal funding - looks for low-hanging fruit

A

Unskilled attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A threat actor with a purpose

Motivated by philosophy, revenge, disruption, etc.

Often external, but may also be an insider threat

Can be remarkably sophisticated

Limited funding

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A threat actor who uses their privileged knowledge of an organization to attack that organization

Motivated by revenge or financial gain

ALWAYS internal

Extensive resources - uses the org’s own resources against them

Medium level of sophistication - has institutional knowledge

A

Insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A threat actor compromised of professional criminals. They perform their crime in an organized way: one person hacks, another manages exploits, another sells the data, another handles customer support, etc.

Motivated by money

Almost always external

Very sophisticated - need the skills to back up their pay

Lots of capital to fund hacking efforts

A

Organized crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A threat actor that is a group or department that works around the existing policies/procedures of the IT department in an organization. They may build their own infrastructure, install their own applications, and start using them without the IT department realizing what is happening. They are not under the limitations of change control, security policies, and the org’s budget.

Motivated by philosophical beliefs, revenge

Internal

Limited resources

Medium sophistication - may not have IT training/knowledge, makes it more insecure

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the threat actor

Location: external

Resources: extensive

Sophistication: very high

Motivations: data exfiltration, philosophical beliefs, revenge, disruption, war

A

Nation state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the threat actor

Location: external

Resources: limited

Sophistication: very low

Motivations: disruption, data exfiltration, philosophical beliefs

A

Unskilled attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name the threat actor

Location: external

Resources: some funding

Sophistication: can be high

Motivations: philosophical beliefs, revenge, disruption/chaos

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the threat actor

Location: internal

Resources: many resources

Sophistication: medium

Motivations: revenge, financial gain

A

Insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the threat actor

Location: external

Resources: many resources

Sophistication: very high

Motivations: financial

A

Organized crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name the threat actor

Location: internal

Resources: many resources

Sophistication: limited

Motivations: philosophical beliefs, revenge

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly