Chapt 2 threat types Flashcards

1
Q

Vulnerability

A

A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat

A

A potential for an entity to exercise a vulnerability (that is, to breach security).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk

A

Likelihood and impact (or consequence) of a threat actor exercising a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Shadow IT

A

Computer hardware, software, or services used on a private network without authorization from the system owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat Vector

A

A path or means by which a threat can gain access to a target.
Example: An email phishing campaign that targets employees to steal their login credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attack Vector

A

A specific path or method used by an attacker to carry out an attack.
Example: Using a vulnerability in a web application to execute a SQL injection attack and gain access to a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unsupported Systems

A

An unsupported system is one where its vendor no longer develops updates and patches. vulnerable software will be exposed as a threat vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An exploit technique for any given software vulnerability can be classed as either remote or local meaning?

A

Remote Exploit: Can be executed over a network without authentication.
Example: An attacker sends malicious packets to a web server to exploit a buffer overflow vulnerability, gaining control of the server.

Local Exploit: Requires an authenticated session or valid credentials to execute.
Example: An attacker gains access to a computer by logging in with stolen credentials and then exploits a privilege escalation vulnerability to gain administrative rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Lure

A

An attack type that will entice a victim into using or opening a removable device,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Supplier (B2B)

A

obtains products directly from a manufacturer to sell in bulk to other businesses. This type of trade is referred to as business to business (B2B).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vendor B2B & B2C

A

obtains products from suppliers to sell to retail businesses (B2B) or directly to customers (B2C). A vendor might add some level of customization and direct support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OEM

A

Original Equipment Manufacturers-
are companies that produce parts or equipment that may be marketed by another manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MSP

A

Managed Service Providers-
companies that offer a range of IT services to businesses, allowing them to outsource their IT needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pharming

A

attack is one that redirects users from a legitimate website to a malicious one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Typosquatting

A

means that the threat actor registers a domain name very similar to a real one, such as exannple.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

business email compromise

A

An impersonation attack in which the attacker gains control of an employee’s account and uses it to convince other employees to perform fraudulent actions.

17
Q

Watering Hole Attack

A

An attack where cybercriminals compromise a legitimate website that is commonly visited by a target group, infecting it with malware to capture sensitive information or gain unauthorized access.

For example, staff running an international e-commerce site might use a local pizza delivery firm. A threat actor might discover this fact through social engineering or other reconnaissance of the target. An attacker can compromise the pizza delivery firm’s website so that it runs exploit code on visitors. They may be able to infect the computers of the e-commerce company’s employees and penetrate the e-commerce company systems.

18
Q

Attack Surface

A

The attack surface is all the points at which a malicious threat actor could try to exploit a vulnerability.