Chapter 2 Flashcards

1
Q

What are the attributes of threat actors?

A
  1. internal/external
  2. sophistication/capability
  3. resources/funding.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between internal and external threat actors?

A

Internal actors have legitimate access; external actors must break into a system without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does sophistication/capability refer to?

A

It describes the threat actor’s ability to use advanced tools and techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does resources/funding mean in relation to threat actors?

A

It refers to the financial/logistical support needed for tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are common motivations of threat actors?

A
  • service disruption
  • data exfiltration
  • disinformation
  • revenge
  • financial gain
  • political agendas.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three primary strategies used by threat actors?

A

The three strategies are service disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do threat actor strategies impact the CIA triad?

A

Data exfiltration compromises confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the goal of service disruption?

A

To prevent an organization from working normally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is data exfiltration?

A

It is the unauthorized copying or transfer of valuable information from a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is disinformation?

A

Disinformation involves falsifying trusted resources like websites or spreading false information via social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are chaotic motivations?

A

Early attacks aimed to cause chaos for fun or credit; modern chaos-driven attacks often further political or revenge motives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are financial motivations?

A

Threat actors commit blackmail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is blackmail in cybersecurity?

A

Blackmail involves demanding payment to prevent the release of stolen or falsified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is extortion?

A

Extortion involves demanding payment to stop or prevent an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is fraud in cybersecurity?

A

Fraud involves falsifying records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are political motivations for threat actors?

A

These include whistleblowing

17
Q

What is cyber espionage?

A

Cyber espionage involves stealing secrets for political

18
Q

What is a whistleblower?

A

A whistleblower releases confidential information due to ethical concerns

19
Q

What are the main types of threat actors?

20
Q

What is a hacker?

A

A hacker is an individual skilled in gaining unauthorized access to systems; they can be unauthorized (malicious) or authorized (ethical).

21
Q

What is an unskilled attacker?

A

An unskilled attacker uses hacking tools without fully understanding them

22
Q

Who are hacker teams and hacktivists?

A

Groups like Anonymous or WikiLeaks use cyberattacks to promote political or social agendas.

23
Q

Who are nation-state actors?

A

Government-sponsored groups that use cyberattacks for military

24
Q

What is an advanced persistent threat (APT)?

A

An APT is a long-term

25
Q

How do nation-state actors use false flags?

A

They pose as independent groups or hacktivists to disguise their involvement in cyberattacks.

26
Q

What role does organized crime play in cyber threats?

A

Organized crime commits financial fraud

27
Q

How can competitors pose a cyber threat?

A

Rogue businesses may perform espionage

28
Q

What is an internal threat actor?

A

An internal threat actor is someone within an organization (e.g.

29
Q

What motivates internal threat actors?

30
Q

What is shadow IT?

A

Shadow IT refers to unauthorized hardware or software introduced into an organization

31
Q

What is an unintentional insider threat?

A

It involves mistakes

32
Q

What is the CIA triad?

A

The CIA triad refers to the principles of Confidentiality