Chapter 1.3 Flashcards

1
Q

Competitor

A

Competitor attacks might be facilitated by employees who have recently changed companies and bring an element of insider knowledge with them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Organized crime

A

Organized crime can operate across the Internet from different jurisdictions than its victim, increasing the complexity of prosecution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

APT

A

The term Advanced Persistent Threat (APT) was coined to understand the behavior underpinning modern types of cyber adversaries. An APT refers to the ongoing ability of an adversary to compromise network security (to obtain and maintain access) using a variety of tools and techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Insider threats

A

Insider threats are employees who harbor grievances or perpetrate fraud. An insider threat might plan and execute a campaign to modify invoices and divert funds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DNS harvesting

A

DNS harvesting uses Open Source Intelligence (OSINT) to gather information about a domain (subdomains, hosting provider, administrative contacts, and so on).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly