701 - Chapter 6 Flashcards
What is a threat actor?
Anyone who launches a cyber attack on others
Who are attackers who are directly employed by or sponsored by a government called?
Nation state attackers
Who is a threat actor type that is motivated by money?
Organized crime
What is an organized and sophisticated group of threat actors called?
In advanced persistent threat APT
This attacker uses existing computer scripts or code to launch attacks, they typically have very little expertise or sophistication and very little funding?
Unskilled attacker
This attacker launches attacks as part of an activist movement or to further cause and raise awareness for that cause?
Hactivist
This attacker has legitimate access to an organizations, internal resources, such as an employee of a company? What tool would be useful in combining an insider threat?
Insider threat… DLP tools by preventing these attackers from writing data to external media
What are the three attacker attributes?
Internal versus external… resources and funding… level of sophistication and capability
What are the ten threat actor motivations?
DATA exfiltration, disruption and chaos, financial gain, blackmail, service disruption, philosophical or political beliefs, ethical, revenge, espionage, war
What are the paths that attackers use to gain access to computers and networks called?
Threat vectors
This threat vector is frequently sent out as spam with malicious links or attachments?
Message based
This threat vector occurs by embedding, malicious code within image files or using Steganography to hide data within an image?
Image based
This threat vector involves malicious code hidden in Files such as documents or spreadsheets?
File based
This threat vector includes phone based social engineering attacks where attackers impersonate trusted individuals or organizations into revealing sensitive information or granting access to secure systems?
Voice call
This threat vector occurs when an attacker loads a virus or malware on an external device?
Removable device
This threat vector targets vulnerabilities in software applications? What types of these are especially vulnerable?
Software based… unsupported applications
This threat vector targets vulnerabilities in computer systems, such as operating systems, vulnerable applications, hardware issues, open service, ports, or default credentials?
System-based
This threat vector exploits weaknesses Through unsecured wired or wireless networks or vulnerable Bluetooth connections or even eavesdropping on traffic?
Network based
This threat vector targets the relationships between organizations and their managed service providers, vendors or suppliers?
Supply chain
What is the term for all of the threat vectors that an organization is exposed to other words all the way that attacker might come after them?
The attack surface
What refers to any unauthorized system or application within an organization, including cloud services? And why does this increase risk for an organization?
Shadow IT… because these systems aren’t always well managed
What is the term for a wide range of software that has malicious intent called?
Malware
What are some symptoms that your system is infected with malware?
It is running slower, starting unknown processes, sending out email without user action, rebooting randomly
True or false virus and malware are the same thing?
False a virus is a specific type of malware, and there are many other types of malware
This malware type is malicious code that attaches itself to a host application and executes when the host application executes?
A virus
This malware type is self replicating and travels through a network without assistance of a host application or user interaction? What is one of the significant problems caused by this malware type?
A worm… they consume network bandwidth which can negatively impact the performance of the network
This malware type is a string of code embedded into an application or script that will execute in response to an event or date and time?
Logic bomb