Chapter 2 Flashcards

1
Q

What are the attributes of threat actors?

A
  1. internal/external
  2. sophistication/capability
  3. resources/funding.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between internal and external threat actors?

A

Internal actors have legitimate access; external actors must break into a system without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does sophistication/capability refer to?

A

It describes the threat actor’s ability to use advanced tools and techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does resources/funding mean in relation to threat actors?

A

It refers to the financial/logistical support needed for tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are common motivations of threat actors?

A
  • service disruption
  • data exfiltration
  • disinformation
  • revenge
  • financial gain
  • political agendas.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three primary strategies used by threat actors?

A

The three strategies are service disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do threat actor strategies impact the CIA triad?

A

Data exfiltration compromises confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the goal of service disruption?

A

To prevent an organization from working normally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is data exfiltration?

A

It is the unauthorized copying or transfer of valuable information from a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is disinformation?

A

Disinformation involves falsifying trusted resources like websites or spreading false information via social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are chaotic motivations?

A

Early attacks aimed to cause chaos for fun or credit; modern chaos-driven attacks often further political or revenge motives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are financial motivations?

A

Threat actors commit blackmail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is blackmail in cybersecurity?

A

Blackmail involves demanding payment to prevent the release of stolen or falsified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is extortion?

A

Extortion involves demanding payment to stop or prevent an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is fraud in cybersecurity?

A

Fraud involves falsifying records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are political motivations for threat actors?

A

These include whistleblowing

17
Q

What is cyber espionage?

A

Cyber espionage involves stealing secrets for political

18
Q

What is a whistleblower?

A

A whistleblower releases confidential information due to ethical concerns

19
Q

What are the main types of threat actors?

20
Q

What is a hacker?

A

A hacker is an individual skilled in gaining unauthorized access to systems; they can be unauthorized (malicious) or authorized (ethical).

21
Q

What is an unskilled attacker?

A

An unskilled attacker uses hacking tools without fully understanding them

22
Q

Who are hacker teams and hacktivists?

A

Groups like Anonymous or WikiLeaks use cyberattacks to promote political or social agendas.

23
Q

Who are nation-state actors?

A

Government-sponsored groups that use cyberattacks for military

24
Q

What is an advanced persistent threat (APT)?

A

An APT is a long-term

25
How do nation-state actors use false flags?
They pose as independent groups or hacktivists to disguise their involvement in cyberattacks.
26
What role does organized crime play in cyber threats?
Organized crime commits financial fraud
27
How can competitors pose a cyber threat?
Rogue businesses may perform espionage
28
What is an internal threat actor?
An internal threat actor is someone within an organization (e.g.
29
What motivates internal threat actors?
Revenge
30
What is shadow IT?
Shadow IT refers to unauthorized hardware or software introduced into an organization
31
What is an unintentional insider threat?
It involves mistakes
32
What is the CIA triad?
The CIA triad refers to the principles of Confidentiality