Chapter 1: Key Terms Flashcards

1
Q

Threat Actor

A

The individual or entity that is responsible `for attacks against the technology of enterprises and users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attributes

A

Characteristic features of the different groups of threat actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intent/Motivation

A

Reasons for an attack by threat actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hacker

A

A person who uses advanced computer skills to attack computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Black hat hackers

A

Threat actors who violate computer security for personal gain or to inflict malicious damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

White hat hackers

A

Hackers that probe a system with an organization’s permission to find weaknesses and report them to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Gray hat hackers

A

Hackers that probe a system without an organization’s permission to expose flaws the system and get the company to take action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Script Kiddies

A

Individuals who want to perform attacks yet lack the technical knowledge to carry them out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hacktivists

A

A group of attackers that is strongly motivated by ideology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

State Actors

A

Government-sponsored attackers who launch cyberattacks against the foes of the state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Advanced Persistent Threat (APT)

A

An attack that uses advanced methods to infect and silently extract data over an extended period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Insider Threat

A

Trusted employees that attack an organization from the inside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Competitors

A

Attackers who launch attacks against an opponent’s system to steal classified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Criminal Syndicates

A

Attackers that contract out their services to aid in criminal activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Shadow IT

A

Employees that install their own equipment or software that violates company policy and exposes the company to attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brokers

A

Attackers that sell their knowledge of a weakness to other attackers or governments.

17
Q

Cyberterrorists

A

Attackers that attack a nation’s network to cause disruption and panic among citizens.

18
Q

Legacy Platform

A

An older platform that no longer widespread.

19
Q

On-premises Platform

A

A platform that remains within the physical confines of an enterprise.

20
Q

Cloud Platform

A

A pay-per-use computing model in which customers pay only for the online computing resources they need.

21
Q

Third Parties

A

External entities outside of the organization.

22
Q

Outsourced Code Development

A

Contracting third parties to aid in the development of a program.

23
Q

Data Storage

A

Third-party facilities used for storing important data.

24
Q

Vendor Management

A

The process where organizations monitor and manage third party companies they are working with.

25
Q

System Integration

A

Connectivity between the systems of an organization and its third parties.

26
Q

Lack of Vendor Support

A

A lack of expertise to handle system integration.

27
Q

Patch

A

An officially released software security update intended to repair a vulnerability.

28
Q

Firmware

A

Software that is embedded into hardware to provide low-level controls and instructions.

29
Q

Zero Day

A

A vulnerability that is exploited by attackers before anyone else even knows it exists.

30
Q

Attack Vector

A

A pathway or avenue used by a threat actor to penetrate a system.

31
Q

Email Vector

A

An attack vector in which an attacker delivers malware through email.

32
Q

Wireless Vector

A

An attack vector in which an attacker intercepts data as it travels across a wireless network.

33
Q

Removable Media Vector

A

An attack vector in which an attacker uses removeable media such as a flash drive to infect a system.