Chap 2 Flashcards
What is involved in a security assessment?
- Vulnerability
- Threat
- Risk
What is a Vulnerability?
A weakness that could be triggered accidentally or exploited intentionally to cause a security breach
What is a Threat?
The Potential for someone or something to exploit a vulnerability and breach security.
A security threat can be intentional and unintentional. T/F
True
What is a threat actor/agent?
A person or thing that poses a threat
What is an attack vector?
A path or tool used by a malicious threat actor/agent
What is a Risk?
The likelihood and impact (or consequence) of a threat actor exploiting a vulnerability.
What is involved when analyzing Cyber Security threats?
Identifying the attributes of threat actors in terms of location, intent and capability.
What is classified as an external threat actor?
The threat actor has no account or authorized access to the target system.
What is classified as an internal threat actor?
Threat actor that has been granted permissions on the system.
What is classified as intent?
Intent is what an attacked hopes to achieve from the attack
What is classified as motivation?
Motivation is the attacker’s reason for perpetrating the attack.
How can a threat be characterized?
structured/ unstructured (targeted vs opportunistic)
Where do the most capable threat actors receive funding from?
Nation states and criminal syndicates.
What is a hacker?
Individual who has the skill to gain access to computer systems through unauthorized or unapproved means.
What is a black hat hacker?
An unauthorized hacker.
What is a white hat hacker?
An authorized hacker.
What is a grey hat hacker?
Semi-authorized in the sense they will look for vulnerabilities without authorization but will not exploit them.
What is a script kiddie?
Someone who uses hacker tools without necessarily understanding how they work or having the ability to craft new attacks.
What is a hacktivist?
A person or group that might attempt to obtain and release confidential information to the public domain, perform DOS attacks, or deface websites.