Chapter 02: Cyber Security Landscape Flashcards
These are the hackers who act with authorization and seek to discover security vulnerabilities with the intent of correcting them.
White-hat hackers
These are the hackers who act with malicious intent. They seek to defeat security controls and compromise the confidentiality, availability, and integrity of information and systems for their own, unauthorized purposes.
Black hat hackers
These are the hackers who act without proper authorization, but they do so with intent of informing their targets of any security vulnerabilities.
Grey-hat hackers
______ are often such attackers who rely almost entirely on automated tools they download from the internet. These type of attackers often have little knowledge of how their attacks actually work.
Script Kiddies
______ use hacking techniques to accomplish some activist goal.
Hacktivists
What type of threat actor fits under this category:
“They might deface the website of a company whose policies they disagree with.”
Hacktivists
What type of threat actor is anonymous.
Hacktivists
What type of threat actor is a teenager, who has no knowledge of hacking, attempting to hack the school network?
Script Kiddie
What is the motive for Crime Syndicates?
Illegal financial gain
__________, including ransomware, data compromise, distributed denial of service attacks, website defacement, and attacks against critical infrastructure. This is also a cyber crime category.
Cyber-dependent crime
_____, including child pornography, abuse and solicitation. This is also a cybercrime category.
Child Sexual exploitation
_____, includes credit card fraud and business email compromise. This is also a cybercrime category.
Payment Fraud
_______ includes the sale of illegal goods and services. This is also a cybercrime category.
Dark web activity
_______ support, includes facilitating the actions of terrorist groups online. This is also a cybercrime category.
Terrorism
______, includes social engineering, money mules, and the criminal abuse of cryptocurrencies. This is also a cybercrime category.
Cross-cutting crime factors
Organized crime tends to have attackers who range from ____ skilled to highly skilled.
moderately
______ use advanced techniques, are persistent, and are often emblematic of nation-state attacks.
APT
Stuxnet is an example of a(n) ______ attack.
APT
______ occur when an employee, contractor, vendor, or other individual with authorized access to information and systems that access to wage an attack against the organization.
Insider Attacks