Chapter 1.5 - Threat Actors and Vectors Flashcards

Explain different threat actors, vectors, and intelligence sources

1
Q

Advanced Persistent Threat (APT)

A

Attackers being in the network and undetected for a long while to get highly sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Insider Threats

A

A threat to an organization that comes from people within the organization, such as employees or former employees who have inside information concerning the organization’s security practices, data and computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State Actors

A

People or groups who use their technology skills to facilitate hacking, sabotage, theft, misinformation and other operations on behalf of a country

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hacktivists

A

A hacker that has a purpose of social change or with a political agenda

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Script Kiddies

A

An unsophisticated attacker who runs pre-made scripts without any knowledge of what’s really happening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Criminal Syndicates

A

Professional criminals doing organized crime motivated by money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hackers

A

Person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hackers (authorized)

A

An ethical hacker with good intentions and has permission to hack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hackers (unauthorized)

A

A malicious hacker who violates security for personal gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hackers (semi-authorized)

A

A hacker who finds a vulnerability but doesn’t use it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shadow IT

A

The use of IT-related hardware or software by a department or individual without the knowledge of the IT or security group within the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Competitors (Threat Actor)

A

A different organization having negative intents against your company by trying to take information or corrupt databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attributes of Actors

A

Internal/ external, level of sophistication/ capability, resources/ funding, intent/ motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attack Vectors

A

A method used by the attacker to gain access or infect the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attack Vectors (Direct Access)

A

Physically accessing the data center and modifying the operating system
Examples: keylogger, transfer files, DoS, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attack Vectors (Wireless)

A

Modifying the access point of configuration
Examples: rogue access point, evil twin, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attack Vectors (Email)

A

Using an email to attack someone
Examples: phishing, delivery of malware, etc.

18
Q

Attack Vectors (Social Media)

A

Putting personal information online and using it against the user
Examples: user profiling

19
Q

Attack Vectors (Removable Media)

A

Using attacks to remove media from systems
Examples: USB, flash drive, data exfiltration

20
Q

Attack Vectors (Cloud)

A

Using security misconfigurations against applications and services
Examples: Brute force, orchestration attacks, DoS

21
Q

Open-source Intelligence (OSINT)

A

Researching threat using public open-source resources
Examples: Internet, government data, commercial data

22
Q

Vulnerability Databases

A

Places where vulnerabilities can be researched
Examples: common vulnerabilities and exposures (CVE)

23
Q

Public/ Private Information Sharing Centers

A

Provides a central resource for gathering information on cyber and related threats to critical infrastructure and providing two-way sharing of information between the private and public sectors

24
Q

Dark Web

A

Overlay networks that use the Internet but require specific software, configurations, or authorization to access

25
Q

Indicators of Compromise (IOC)

A

An event that indicates an intrusion
Examples: uncommon login patterns, unusual amount of connectivity

26
Q

Automated Indicator Sharing (AIS)

A

A way for the intelligence industry to share important threat data or indicators

27
Q

Structured Threat Information eXpression (STIX)

A

Describes cyber threat information
Examples: motivations, abilities, capabilities, etc.

28
Q

Trusted Automated eXchange of Intelligence Information (TAXII)

A

Securely shares the STIX data over HTTPS

29
Q

Predictive Analysis

A

Analyze a large amount of data, identify behaviors, and create a forecast for potential attacks

30
Q

Threat Maps

A

A map created from real attack data to identify attacks and trends

31
Q

File/ Code Repositories

A

Places to see code of what hackers are building and what people are accidentally releasing
Examples: GitHub

32
Q

Threat Research

A

Seeking out potential risks and delivering insights to take action

33
Q

Vendor Websites (research sources)

A

Them knowing when problems occur

34
Q

Vulnerability Feeds (research sources)

A

Automated vulnerability notifications for when threats occur

35
Q

Conferences (research sources)

A

A place to gathering information from other professionals about attacks

36
Q

Academic Journals (research sources)

A

Research from academic professionals about security technologies

37
Q

Request for Comments (RFC) (research sources)

A

Document that contains specifications and organizational notes about topics related to the internet and computer networking, such as routing, addressing and transport technologies

38
Q

Local Industry Groups (research sources)

A

A gathering of local peers for shared industry and technology insights

39
Q

Social Media (research sources)

A

Profiles with group conversations - professionals discussing details

40
Q

Threat Feeds (research sources)

A

Monitoring threat announcements to stay informed
Examples: U.S. department of homeland security, etc.

41
Q

Adversary Tactics, Techniques, and Procedures (TTP)

A

Describe the behaviors, strategies and methods used by attackers to develop and execute cyber attacks on enterprise networks