Ch2 Flashcards

1
Q

What are the attributes of threat actors?

A

The attributes are internal/external, sophistication/capability, and resources/funding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between internal and external threat actors?

A

Internal actors have legitimate access; external actors must break into a system without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does sophistication/capability refer to?

A

It describes the threat actor’s ability to use advanced tools and techniques, ranging from basic tools to custom exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does resources/funding mean in relation to threat actors?

A

It refers to the financial/logistical support needed for tools, skilled personnel, and strategies. Nation-states and organized crime often provide funding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are common motivations of threat actors?

A

Motivations include service disruption, data exfiltration, disinformation, revenge, financial gain, and political agendas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three primary strategies used by threat actors?

A

The three strategies are service disruption, data exfiltration, and disinformation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do threat actor strategies impact the CIA triad?

A

Data exfiltration compromises confidentiality, disinformation attacks integrity, and service disruption targets availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the goal of service disruption?

A

To prevent an organization from working normally, either for revenge, chaos, or blackmail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is data exfiltration?

A

It is the unauthorized copying or transfer of valuable information from a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is disinformation?

A

Disinformation involves falsifying trusted resources like websites or spreading false information via social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are chaotic motivations?

A

Early attacks aimed to cause chaos for fun or credit; modern chaos-driven attacks often further political or revenge motives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are financial motivations?

A

Threat actors commit blackmail, extortion, or fraud to make a profit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is blackmail in cybersecurity?

A

Blackmail involves demanding payment to prevent the release of stolen or falsified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is extortion?

A

Extortion involves demanding payment to stop or prevent an attack, such as ransomware blocking access to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is fraud in cybersecurity?

A

Fraud involves falsifying records, tampering with accounts, or spreading false news to gain financial advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are political motivations for threat actors?

A

These include whistleblowing, campaign group disruptions, or nation-states targeting other governments and organizations.

17
Q

What is cyber espionage?

A

Cyber espionage involves stealing secrets for political, military, or commercial gain.

18
Q

What is a whistleblower?

A

A whistleblower releases confidential information due to ethical concerns, often acting with protected disclosures.

19
Q

What are the main types of threat actors?

A

Hackers, unskilled attackers, hacker teams/hacktivists, nation-state actors, organized crime, competitors, and internal threats.

20
Q

What is a hacker?

A

A hacker is an individual skilled in gaining unauthorized access to systems; they can be unauthorized (malicious) or authorized (ethical).

21
Q

What is an unskilled attacker?

A

An unskilled attacker uses hacking tools without fully understanding them, often targeting systems opportunistically.

22
Q

Who are hacker teams and hacktivists?

A

Groups like Anonymous or WikiLeaks use cyberattacks to promote political or social agendas.

23
Q

Who are nation-state actors?

A

Government-sponsored groups that use cyberattacks for military, strategic, or economic goals, often maintaining plausible deniability.

24
Q

What is an advanced persistent threat (APT)?

A

An APT is a long-term, sophisticated attack used to maintain ongoing access to a system.

25
How do nation-state actors use false flags?
They pose as independent groups or hacktivists to disguise their involvement in cyberattacks.
26
What role does organized crime play in cyber threats?
Organized crime commits financial fraud, extortion, and blackmail, often across jurisdictions to evade prosecution.
27
How can competitors pose a cyber threat?
Rogue businesses may perform espionage, steal trade secrets, or disrupt operations to harm rivals.
28
What is an internal threat actor?
An internal threat actor is someone within an organization (e.g., employees, contractors) who misuses their legitimate access.
29
What motivates internal threat actors?
Revenge, financial gain, and opportunistic misuse of access often motivate internal actors.
30
What is shadow IT?
Shadow IT refers to unauthorized hardware or software introduced into an organization, creating unmonitored vulnerabilities.
31
What is an unintentional insider threat?
It involves mistakes, oversights, or carelessness, such as weak passwords or poor security practices.
32
What is the CIA triad?
The CIA triad refers to the principles of Confidentiality, Integrity, and Availability in cybersecurity.