Chapter 5 Threat Actors, Vectors, and Intelligence Sources Flashcards

1
Q

What is an Advanced Persistent Threat (APT)?

A

An APT attack is characterized by using toolkits to achieve a presence on a target network and then, instead of just moving to steal information, focusing on maintain a presence on the target network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an Insider threat?

A

Employees who have access to internal networks that choose to wreak havoc on their employers systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are State Actors?

A

Employed by governments to compromise or gain access to the intelligence data of targeted governments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Hacktivists?

A

When hackers work together for a collective effort, typically on behalf of some cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Script kiddie?

A

Individuals who do not have the technical expertise to develop scripts or discover new vulnerabilities in software, but have enough know how to download and run scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a criminal syndicate?

A

Criminal groups that work together in order to steal large sums of money via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Shadow IT?

A

Parts of an organization that perform their own IT functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Vectors?

A

The various methods that an attacker can use to get in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are seven common attack vectors?

A

Direct access, Wireless, E-mail, Supply chain, Social Media, Removeable media, and cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Threat Intelligence?

A

The gathering of information from a variety of sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Open Source Intelligence (OSINT)?

A

Intel data collected from public sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is automated indicator sharing?

A

A collection of information such as malicious email addresses, IP addresses, and other bad material reported by private companies to the DHS via its Automated Indicator Sharing (AIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is InfraGard?

A

A vetted access collection of security info reported to the FBI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Internet Storm Center (ISC)?

A

A distributed sensor network that processes over 20 million intrusion detection log entries per day and generated alerts concerning security threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a VirusTotal?

A

Uses feeds from a myriad of antivirus scanners to maintain a signature database of malware and related information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Cisco?

A

A feed of information for cisco customers

17
Q

What are Indicators of Compromise?

A

Indications that a system has been compromised by unauthorized activity

18
Q

What is Predictive Analysis?

A

The use of threat intelligence info to anticipate the next move of a threat

19
Q

What are Threat maps?

A

Geographical representations of attacks showing where packets are coming from and going to

20
Q

What are Requests for Comment (RFC)?

A

The sets of standards used to define how the internet and the protocols involved in the world wide web are established and managed