Chapter 2 Flashcards

1
Q

Characteristics of cyber security threat actor types

A
  • Internal / External
  • Level of sophistication / Capability
  • Resources / Funding
  • Intent / Motivation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The motivations of attackers

A
  • Black-hat
  • White-hat
  • Gray-hat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Different types of threat actors

A

Script kiddies - hack for reputation, proving their skill

  • Many of them
  • Unfocused
  • Lack of skill
  • Lack of resources (both time and money) - many work alone
  • External

Hacktivists

  • The measures that deter others might not deter them
  • Hack for a higher purpose
  • The skills vary
  • The resources vary - many work alone
  • External, sometimes internal

Criminal syndicates

  • Financial gain - solely!
  • Tend to stay in shadows
  • The skills are moderate to highly skilled
  • Tend to have more resources

Advanced persistent threats

  • Espionage, intellectual property, economic assets
  • High skill - advanced techniques, not just tools, attacks are persistent, zero-days
  • Significant resources

Insiders

  • Employees wage an attack against an organization, leaks
  • Activist goals, financial gain
  • Any skill level
  • Usually work alone
  • Varying resources

Competitors

  • Corporate espionage
  • Will often use disgruntled employee
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Zero-day attacks

A

Zero-days are security issues that have zero days passed since the threat has been known. APT-s often conduct their own research and get zero-days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shadow IT

A

The situation is when people search and get the tools unapproved from the organization for the purpose of being more productive. This means the business means are not being met by the enterprise IT team.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat vectors

A

Email and social media

  • Most commonly exploited
  • Easy to exploit
  • Phishing, spam
  • Can be executed towards many targets

Direct access

  • Go to publicly accessible places (lobby, toilettes) and execute the attack
  • Find unsecured network device, terminal, or server

Wireless networks
* Can be accessed from the parking lot

Removable media
* Drop cheap devices and wait for them to be plugged in

Cloud
* Attackers scan for publicly accessible cloud resources

Third-party risks
* Supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

About Threat data and intelligence

A
  • Threat intelligence is the set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment
  • Open source threat intelligence is threat intelligence that is acquired from publicly available sources
  • Proprietary and Closed-Source Intelligence
  • Threat maps provide a geographic view of threat intelligence - not reliable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Assessing Threat Intelligence

A
  • Is it timely? A feed that is operating on delay can cause you to miss a threat, or to react after the threat is no longer relevant.
  • Is the information accurate? Can you rely on what it says, and how likely is it that the assessment is valid? Does it rely on a single source or multiple sources? How often are those sources correct?
  • Is the information relevant? If it describes the wrong platform, software, or reason for the organization to be targeted, the data may be very timely, very accurate, and completely irrelevant to your organization.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

STIX

A
  • Structured Threat Information eXpression (STIX) is an XML language
  • STIX 2.0 defines 12 STIX domain objects, including things like attack patterns, identities, malware, threat actors, and tools
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TAXII

A
  • Trusted Automated eXchange of Indicator Information (TAXII)
  • intended to allow cyber threat information to be communicated at the application layer via HTTPS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TTPs

A
  • Adversary tactics, techniques, and procedures (TTPs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OpenIOC

A
  • Open Indicators of Compromise (OpenIOC) format

* Similar to STIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly