Ch2 Flashcards

1
Q

What are the attributes of threat actors?

A

The attributes are internal/external, sophistication/capability, and resources/funding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between internal and external threat actors?

A

Internal actors have legitimate access; external actors must break into a system without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does sophistication/capability refer to?

A

It describes the threat actor’s ability to use advanced tools and techniques, ranging from basic tools to custom exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does resources/funding mean in relation to threat actors?

A

It refers to the financial/logistical support needed for tools, skilled personnel, and strategies. Nation-states and organized crime often provide funding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are common motivations of threat actors?

A

Motivations include service disruption, data exfiltration, disinformation, revenge, financial gain, and political agendas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three primary strategies used by threat actors?

A

The three strategies are service disruption, data exfiltration, and disinformation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do threat actor strategies impact the CIA triad?

A

Data exfiltration compromises confidentiality, disinformation attacks integrity, and service disruption targets availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the goal of service disruption?

A

To prevent an organization from working normally, either for revenge, chaos, or blackmail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is data exfiltration?

A

It is the unauthorized copying or transfer of valuable information from a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is disinformation?

A

Disinformation involves falsifying trusted resources like websites or spreading false information via social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are chaotic motivations?

A

Early attacks aimed to cause chaos for fun or credit; modern chaos-driven attacks often further political or revenge motives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are financial motivations?

A

Threat actors commit blackmail, extortion, or fraud to make a profit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is blackmail in cybersecurity?

A

Blackmail involves demanding payment to prevent the release of stolen or falsified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is extortion?

A

Extortion involves demanding payment to stop or prevent an attack, such as ransomware blocking access to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is fraud in cybersecurity?

A

Fraud involves falsifying records, tampering with accounts, or spreading false news to gain financial advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are political motivations for threat actors?

A

These include whistleblowing, campaign group disruptions, or nation-states targeting other governments and organizations.

17
Q

What is cyber espionage?

A

Cyber espionage involves stealing secrets for political, military, or commercial gain.

18
Q

What is a whistleblower?

A

A whistleblower releases confidential information due to ethical concerns, often acting with protected disclosures.

19
Q

What are the main types of threat actors?

A

Hackers, unskilled attackers, hacker teams/hacktivists, nation-state actors, organized crime, competitors, and internal threats.

20
Q

What is a hacker?

A

A hacker is an individual skilled in gaining unauthorized access to systems; they can be unauthorized (malicious) or authorized (ethical).

21
Q

What is an unskilled attacker?

A

An unskilled attacker uses hacking tools without fully understanding them, often targeting systems opportunistically.

22
Q

Who are hacker teams and hacktivists?

A

Groups like Anonymous or WikiLeaks use cyberattacks to promote political or social agendas.

23
Q

Who are nation-state actors?

A

Government-sponsored groups that use cyberattacks for military, strategic, or economic goals, often maintaining plausible deniability.

24
Q

What is an advanced persistent threat (APT)?

A

An APT is a long-term, sophisticated attack used to maintain ongoing access to a system.

25
Q

How do nation-state actors use false flags?

A

They pose as independent groups or hacktivists to disguise their involvement in cyberattacks.

26
Q

What role does organized crime play in cyber threats?

A

Organized crime commits financial fraud, extortion, and blackmail, often across jurisdictions to evade prosecution.

27
Q

How can competitors pose a cyber threat?

A

Rogue businesses may perform espionage, steal trade secrets, or disrupt operations to harm rivals.

28
Q

What is an internal threat actor?

A

An internal threat actor is someone within an organization (e.g., employees, contractors) who misuses their legitimate access.

29
Q

What motivates internal threat actors?

A

Revenge, financial gain, and opportunistic misuse of access often motivate internal actors.

30
Q

What is shadow IT?

A

Shadow IT refers to unauthorized hardware or software introduced into an organization, creating unmonitored vulnerabilities.

31
Q

What is an unintentional insider threat?

A

It involves mistakes, oversights, or carelessness, such as weak passwords or poor security practices.

32
Q

What is the CIA triad?

A

The CIA triad refers to the principles of Confidentiality, Integrity, and Availability in cybersecurity.