2.1Compare and contrast common threat actors and motivations Flashcards

1
Q

Type of Threat actors

A
  • Nation-state
  • Unskilled attacker
  • Hacktivist
  • Insider threat
  • Organized crime
  • Shadow IT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a Threat Actor

A

individual or entity that’s responsible for incidents that impact security and data protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unskilled Attackers

A

Unskilled Attackers are individuals
with limited technical experience
who use readily available tools like downloaded scripts,or exploits to carry out their attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nation-state Actor

A

● Highly skilled attackers sponsored by governments for cyber espionage or
warfare

○ Sometimes, these threat actors attempt what is known as a false flag attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advanced Persistent Threat (APT)

A

used synonymously with a nation-state actor because of
their long-term persistence and stealth

A prolonged and targeted cyberattacks, undetected for an extended period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What motivates a nation-state actor?

A

to achieve their long-term strategic goals, and
they are not seeking financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

False Flag Attack

A

an attack that appears to originate from
a different source or group than the actual perpetrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attributes of threat actors : characteristics

A
  • Internal/external : within and outside an organization
  • Resources/funding : Tools, skills, and personnel at the disposal of a given threat actor
  • Level of sophistication/capability : Refers to their technical skill, the complexity of the tools and techniques they
    use, and their ability to evade detection and countermeasures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

lowest skilled threat actors

A

Script Kiddie
○ Individual with limited technical knowledge
○ use pre-made software or scripts to exploit computer systems and
networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Advanced technical skilled threat actors

A

Nation-state actors, Advanced Persistent Threats and others have high levels of
sophistication and capabilities and possess advanced technical skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat actors Motivations

A
  • Data exfiltration : Unauthorized transfer of data from a computer
  • Espionage : spying to gather sensitive or classified information
  • Service disruption : disrupt the services of various organizations,
    either to cause chaos, make a political statement, or to demand a ransom
  • Blackmail : obtains sensitive or compromising information threatens to release unless certain demands are met
  • Financial gain : h various means, such as ransomware attacks, or through
    banking trojans
  • Philosophical/political beliefs :known as hacktivism
  • Ethical : Authorized hackers, are motivated by a desire to improve security
  • Disruption/chaos : spreading malware to launching sophisticated cyberattacks
    against the critical infrastructure
  • War : disrupt a country’s infrastructure, compromise its national security, and to cause economic damage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hacktivists

A

cyber attackers driven
by political, social, or environmental ideologies, who often want to draw attention to a specific cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To accomplish their objectives, hacktivists use a wide range of techniques such as :

A
  • Website Defacement : electronic graffiti
  • Distributed Denial of Service (DDoS) Attacks: overwhelm
  • Doxing : public release of private information about an individual or
    organization
  • Leaking of Sensitive Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Most well-known hacktivist groups is known as

A

Anonymous
● Loosely affiliated collective that has been involved in numerous
high-profile attacks over the years for targeting organizations that they
perceive as acting unethically or against the public interest at large

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Organized Crime

A

refers to well-structured groups
that execute cyber attacks for financial gain, usually through methods like ransomware,
identity theft, or credit card fraud, data breaches, online fraud

may be hired by other entities, including governments, to conduct
cyber operations and attacks on their behalf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Insider Threats

A

originate from within the organization,

driven by
- revenge
- financial gain
- carelessness or a lack of awareness

17
Q

To mitigate the risk of an insider threat being successful

A

organizations should
implement the following

● Zero-trust architecture
● Employ robust access controls
● Conduct regular audits
● Provide effective employee security awareness programs

18
Q

Insider threats can take various forms

A

■ Data Theft
■ Sabotage
■ Misuse of access privileges

19
Q

Shadow IT

A

which refers to Information Technology Systems, devices, software,applications and services that are managed and utilized
without explicit organizational approval

and can pose a security risk to your organization.

20
Q

Threat Actors Intent

A

● Specific objective or goal that a threat actor is aiming to achieve through their attack

21
Q

Threat Actors Motivation

A

● Underlying reasons or driving forces that pushes a threat actor to carry
out their attack