3. Threat Actors Flashcards

1
Q

Unskilled Attacker

A

Limited technical expertise, use readily available tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hacktivists

A

Driven by political, social, or environmental ideologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Organized Crime

A

Execute cyberattacks for financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nation-state Actor

A

Highly skilled attackers sponsored by governments for cyber espionage or warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Insider Threats

A

Security threats originating from within the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Shadow IT

A

IT systems, devices, software or services managed without explicit organizational approval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Honeypots

A

Decoy systems to attract and deceive attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Honeynets

A

Network of decoy systems for observing complex attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Honeyfiles

A

Decoy files to detect unauthorized access or data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Honeytokens

A

Fake data to alert administrators when accessed or used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Exfiltration

A

Unauthorized transfer of data from a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Script Kiddie

A

An individual with limited technical knowledge.
use pre-made software or scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Distributed Denial of Service (DDoS) Attack

A

Attempt to overwhelm the victim’s system or network so they cannot be accessed by the organization’s legitimate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat Vector

A

The pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attack Surface

A

Encompasses all the various points where an unauthorized user can try to enter data or extract data from an environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A