2.1 Flashcards

1
Q

What is the difference between the intent of a threat actor and their motivation?

A

The intent is the specific objective or goal the threat actor aims to achieve, while the motivation is the underlying reason or driving force behind the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a threat actor’s intent?

A

A threat actor’s intent is the specific objective or goal they aim to achieve through their attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a threat actor’s motivation?

A

A threat actor’s motivation refers to the underlying reasons or driving forces that push them to carry out the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is data exfiltration?

A

Data exfiltration is the unauthorized transfer of data from a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the motivation of financial gain for threat actors?

A

Financial gain can be achieved through various means, such as ransomware attacks or banking trojans that allow stealing financial information to gain unauthorized access to bank accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is blackmail in the context of threat actors?

A

Blackmail occurs when an attacker obtains sensitive or compromising information and threatens to release it unless certain demands are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the motivation behind service disruption by threat actors?

A

Some threat actors aim to disrupt services to cause chaos, make a political statement, or demand a ransom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is hacktivism?

A

Hacktivism is when attacks are conducted due to the philosophical or political beliefs of the attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What motivates a hacktivist?

A

Hacktivists are motivated by their philosophical or political beliefs, often seeking to make a statement or influence change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the motivation behind ethical hackers?

A

Ethical hackers, also known as authorized hackers, are motivated by a desire to improve security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What motivates a threat actor seeking revenge?

A

A threat actor motivated by revenge seeks to target an entity they believe has wronged them in some way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the motivation behind disruption or chaos?

A

Threat actors motivated by disruption or chaos create and spread malware or launch cyberattacks to cause disorder, such as targeting critical infrastructure in a populated city.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is espionage as a motivation for threat actors?

A

Espionage involves spying on individuals, organizations, or nations to gather sensitive or classified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can war motivate threat actors?

A

Cyber warfare can be used to disrupt a country’s infrastructure, compromise national security, and cause economic damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two most basic attributes of a threat actor?

A

The two most basic attributes of a threat actor are internal threat actors and external threat actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who are internal threat actors?

A

Internal threat actors are individuals or entities within an organization who pose a threat to its security.

17
Q

Who are external threat actors?

A

External threat actors are individuals or groups outside an organization who attempt to breach its cybersecurity defenses.

18
Q

What resources and funding are available to a specific threat actor?

A

A threat actor’s resources include the tools, skills, and personnel at their disposal.

19
Q

What does the level of sophistication and capability refer to in a threat actor?

A

It refers to their technical skill, the complexity of the tools and techniques they use, and their ability to evade detection and countermeasures.

20
Q

Who are “script kiddies” in cybersecurity?

A

Script kiddies are individuals with limited technical knowledge who use pre-made software or scripts to exploit computer systems and networks.

21
Q

What distinguishes advanced threat actors like nation-state actors and Advanced Persistent Threats (APTs)?

A

These advanced threat actors have high levels of sophistication and capabilities, with advanced technical skills, sophisticated tools, and techniques.

22
Q

Who is considered an unskilled attacker or “script kiddie”?

A

A script kiddie is an individual who lacks the technical knowledge to develop their own hacking tools or exploits and relies on pre-made scripts and programs.

23
Q

How do unskilled attackers typically cause damage?

A

Unskilled attackers can cause damage by launching attacks such as DDoS attacks, where they simply enter the target’s IP address and click a button to initiate the attack.

24
Q

Who are hacktivists?

A

Hacktivists are individuals or groups that use their technical skills to promote a cause or drive social change rather than for personal gain.

25
Q

What is hacktivism?

A

Hacktivism refers to activities where hacking and other cyber techniques are used to promote or advance a political or social cause.

26
Q

What techniques do hacktivists use to accomplish their objectives?

A

Hacktivists use a wide range of techniques, including website defacement, DDoS attacks, doxing, and leaking sensitive data.

27
Q

What is website defacement in the context of hacktivism?

A

Website defacement is a form of electronic graffiti, often treated as an act of vandalism, where a website is altered to promote a cause or message.

28
Q

What is a Distributed Denial of Service (DDoS) attack?

A

A DDoS attack attempts to overwhelm the victim’s systems or networks, making them inaccessible to legitimate users.

29
Q

What is doxing in the context of hacktivism?

A

Doxing involves the public release of private information about an individual or organization, often to harm or embarrass them.

30
Q

What is the leaking of sensitive data in hacktivism?

A

Leaking sensitive data refers to releasing confidential or private data to the public via the internet.

31
Q

What motivates hacktivists?

A

Hacktivists are primarily motivated by ideological beliefs rather than financial gain.

32
Q

What is the most well-known hacktivist group?

A

The most well-known hacktivist group is “Anonymous,” a loosely affiliated collective that targets organizations they perceive as unethical or against the public interest.

33
Q
A