Chap 2 Flashcards

1
Q

What is involved in a security assessment?

A
  • Vulnerability
  • Threat
  • Risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Vulnerability?

A

A weakness that could be triggered accidentally or exploited intentionally to cause a security breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Threat?

A

The Potential for someone or something to exploit a vulnerability and breach security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A security threat can be intentional and unintentional. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a threat actor/agent?

A

A person or thing that poses a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an attack vector?

A

A path or tool used by a malicious threat actor/agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Risk?

A

The likelihood and impact (or consequence) of a threat actor exploiting a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is involved when analyzing Cyber Security threats?

A

Identifying the attributes of threat actors in terms of location, intent and capability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is classified as an external threat actor?

A

The threat actor has no account or authorized access to the target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is classified as an internal threat actor?

A

Threat actor that has been granted permissions on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is classified as intent?

A

Intent is what an attacked hopes to achieve from the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is classified as motivation?

A

Motivation is the attacker’s reason for perpetrating the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can a threat be characterized?

A

structured/ unstructured (targeted vs opportunistic)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where do the most capable threat actors receive funding from?

A

Nation states and criminal syndicates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a hacker?

A

Individual who has the skill to gain access to computer systems through unauthorized or unapproved means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a black hat hacker?

A

An unauthorized hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a white hat hacker?

A

An authorized hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a grey hat hacker?

A

Semi-authorized in the sense they will look for vulnerabilities without authorization but will not exploit them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a script kiddie?

A

Someone who uses hacker tools without necessarily understanding how they work or having the ability to craft new attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a hacktivist?

A

A person or group that might attempt to obtain and release confidential information to the public domain, perform DOS attacks, or deface websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an APT?

A

Advance Persistent Threat is the ongoing ability of an adversary to compromise network security.

22
Q

What APT influenced the shaping of the language for modern cyber-attack life cycles?

A

Mandiant’s APT1

23
Q

What is the goal of a state actor?

A

The goal of state actors are primarily espionage and strategic advantage but it is not unknown for countries to target companies for commercial gain

24
Q

What is a criminal syndicate?

A

a group of threat actors that can operate across the internet from different jurisdictions than its victim.

25
Q

An unintentional or inadvertent insider threat is a vector for an external actor or separate internal actor to exploit. T/F?

A

True

26
Q

What is shadow IT?

A

When a user purchases or introduces computer hardware or software to the workplace without the sanction of the IT department or procurement.

27
Q

What is an attack surface?

A

All points at which a malicious threat actor could try to exploit a vulnerability

28
Q

What is minimizing the attack surface?

A

restricting access so that only a few known endpoints, protocols/ports, and services/methods are permitted.

29
Q

What attack vector using a supply chain?

A

Instead of attacking directly a threat actor may seek ways to infiltrate it via companies in its supply chain. ($TGT)

30
Q

What is the deep/dark web?

A

any part of the World Wide Web that is not indexed by a search engine.

31
Q

What is the Dark net?

A

A network established as an overlay to Internet infrastructure by software, such as The Onion Router (TOR), Freenet, or I2P to anonymize usage and prevent third parties from knowing of its existence

32
Q

What are the main forms of research sources?

A
  • Behavioral threat research
  • Reputational threat intelligence
  • Threat data
33
Q

What is Reputational threat intelligence?

A

List of IP addresses and domains associated with malicious behavior, plus signatures of known file-based malware.

34
Q

What is CTI?

A

Cyber threat intelligence is feeds of threat data that is pushed through a SIEM.

35
Q

What are the threat intel platform commercial models?

A
  • Closed/proprietary
  • Public/private information-sharing centers
  • Open Source Intelligence (OSINT)
36
Q

What is an ISAC?

A

Information Sharing and Analysis Centers are set up to share threat intelligence for companies and agencies in critical industries.

37
Q

What is OSINT?

A

Open Source Intelligence is an Open Source threat intelligence service that involves earning income from consultancy.
Also services as a common recon technique for harvesting domains, ip ranges, employees, and other data to id an attack vector.

38
Q

What are other threat intel research sources?

A

Academic Journals, conferences, request for comments (RFC) and Social media.

39
Q

What is TTP?

A

A tactic, technique, or procedure is a generalized statement of adversary behavior derived from US military doctrine.

40
Q

What is a IoC?

A

An indicator of compromise is a residual sign that an asset or network has been successfully attacked or is continuing to be attacked.

41
Q

TTP vs IoC

A

TTP describes what and how an adversary acts while indicators describe how to recognize what those actions might look like.

42
Q

IoC’s are slow to diagnose. T/F

A

True

43
Q

What is a threat data feed?

A

Constant information on cyber threat intelligence from a given source.

44
Q

What is STIX?

A

Structured Threat Information eXpression describes the standard terminology for IoCs and ways of indicating relationships between them.

45
Q

What is TAXII?

A

The Trusted Automated eXchange of Indicator Information provides a means for transmitting CTI data between servers and clients.

46
Q

What is AIS?

A

Automated Indicator Sharing is a service offered by the Department of Homeland Security (DHS) for companies to participate in threat intel sharing.

47
Q

What is a threat map?

A

It is an animated graphic showing the source, target, and type of attacks that have been detected by a CTI platform.

48
Q

What is a file/repository?

A

It holds signatures of known malware code

49
Q

What is a CVE

A

The Common Vulnerabilities and Exposures (CVE) is a list of vulnerabilities database.

50
Q

What is knowledge base in reference to AI?

A

if then rules from a limited data set.

51
Q

What is Machine learning?

A

The use of algorithms to parse input data and then develop strategies for using that data and make gradual improvements in the decision-making process.

52
Q

What is predictive Analysis?

A

A system that can anticipate a particular type of attack and possibly the identity of the threat actor before the attack is fully realized.