(9) Incident Threat Classification Flashcards

1
Q

Describe the Attrition attack vector

A

If an attack happens by way of attrition, then it uses brute force methods to compromise, degrade, or destroy systems, networks, etc. DDoS is a good example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the Web attack vector

A

The web attack vector could include a cross site scripting attack used to steal credentials or to redirect to a site that takes advantage of a browser weakness and puts malware on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the Impersonation attack vector

A

The impersonation attack vector is about replacing something ok with something not ok, This can include spoofing, Man-in-the-middle (on-path) attacks, rogue access points, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the improper usage attack vector

A

The improper usage attack vector is about a user violating an organization’s acceptable use policy by a real user. Also could include installing file sharing software, or if a user does something illegal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the unknown and other attack vector

A

Unknown is an attack that doesn’t come from a known origin. The other attack vector is an attack from a spot that doesn’t fit into a known category

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Advanced Persistent Threats (APTs)?

A

APTs are very skilled hackers that are often funded by nation states and have a specific goal in mind. They take advantage of zero day vulnerabilities, which are those that aren’t known in the security world and aren’t detectable by a security scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly