3. Threat Actors Flashcards
Unskilled Attacker
Limited technical expertise, use readily available tools
Hacktivists
Driven by political, social, or environmental ideologies
Organized Crime
Execute cyberattacks for financial gain
Nation-state Actor
Highly skilled attackers sponsored by governments for cyber espionage or warfare
Insider Threats
Security threats originating from within the organization
Shadow IT
IT systems, devices, software or services managed without explicit organizational approval
Honeypots
Decoy systems to attract and deceive attackers
Honeynets
Network of decoy systems for observing complex attacks
Honeyfiles
Decoy files to detect unauthorized access or data breaches
Honeytokens
Fake data to alert administrators when accessed or used
Data Exfiltration
Unauthorized transfer of data from a computer
Script Kiddie
An individual with limited technical knowledge.
use pre-made software or scripts
Distributed Denial of Service (DDoS) Attack
Attempt to overwhelm the victim’s system or network so they cannot be accessed by the organization’s legitimate users
Threat Vector
The pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action.
Attack Surface
Encompasses all the various points where an unauthorized user can try to enter data or extract data from an environment.