Chapter 6: Comparing Threats, Vulnerabilities, and Common Attacks Flashcards

1
Q

What are Nation-state Attackers?

A

Cyber actors sponsored by a government/nation-state, targeting other nations’ critical infrastructure or intellectual property for political or strategic purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an Advanced Persistent Threat (APT)?

A

A prolonged and targeted cyber attack where attackers gain unauthorized access and maintain persistent access to a network to steal sensitive information or compromise systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the context of Cybersecurity, what is Organized Crime?

A

Typically composed of a group of individuals working together in criminal activities. These groups are typically organized with a hierarchy composed of a leader and workers. The primary motivation of organized crime is money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Hacker?

A

Commonly refers to a malicious individual who gains unauthorized access to systems or networks, with motivations ranging from malicious intent to curiosity, personal challenge, or ideological reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an Unskilled Attacker?

A

Someone who lacks advanced technical knowledge but uses basic tools, scripts, or social engineering to exploit vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Hacktivist?

A

An individual or group who uses hacking to protest or promote political, social, or environmental causes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Insider Threat?

A

A security risk posed by individuals within an organization who misuse their authorized access, either maliciously or accidentally, to harm the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Competitor?

A

A business or individual who may conduct cyber espionage or attacks to gain advantage by stealing sensitive information or intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the three major attributes that distinguish different attackers?

A

Internal vs. External, Resources/funding, and level of sophistication/capability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name a couple of threat actor motivations.

A

Data exfiltration, disruption/chaos, financial gain, blackmail, service disruption, philosophical, political beliefs, ethical, revenge, espionage, and war.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Threat Vector?

A

A method or pathway used by attackers to gain unauthorized access to a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Message-based threat vector?

A

Cyberattacks delivered through email, messaging apps, or other communication channels, often using phishing or malicious links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an Image-based threat vector?

A

Cyberattacks delivered through image files (PNGs, JPEG) to hide malicious code, exploiting vulnerabilities in image-rendering software to deliver malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a File-based threat vector?

A

Cyberattacks delivered through files with malicious code such as executables, documents, or scripts that are opened or executed on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Voice Call-based threat vector?

A

Cyberattacks delivered through phone calls (like vishing) to trick victims into giving up sensitive info by impersonating trusted sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a removable device threat vector?

A

Cyberattacks delivered through removable media such as USBs or SD cards to deliver malware directly to a system when plugged in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a System-based threat vector?

A

Cyberattacks delivered through the exploitation of vulnerabilities in operating systems or applications, like unpatched software or weak configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Network-based threat vector?

A

Cyberattacks delivered through a network channel to attack systems, such as via packet injection, sniffing, or DoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Supply-chain threat vector?

A

Compromising third-party vendors or software providers to indirectly attack the target organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Shadow Information Technology (IT)?

A

Unauthorized hardware or software used without IT’s knowledge or approval, often creating security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Malware?

A

Software designed to harm systems or steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a Virus?

A

Malware that attaches to files and spreads when the host file is run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Worm?

A

Self-replicating malware that spreads across systems without needing a host file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a Logic Bomb?

A

Malicious code activated by specific conditions or actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a Trojan?

A

Malware that pretends to be legitimate software to deceive users into running it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is Scareware?

A

Malware that tricks users with fake warnings to install other malicious software or pay money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a Remote Access Trojan (RAT)?

A

A Trojan that lets attackers remotely control the infect device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a Keylogger?

A

Software that captures everything a user types to steal sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is Spyware?

A

Malware that secretly gather user info and sends it to an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a Rootkit?

A

A stealthy malware that hide its existence and provides administrative access to attackers.

31
Q

What is Ransomware?

A

Malware that locks or encrypts data and demands payment to restore access.

32
Q

What is Bloatware?

A

Unnecessary software that slows systems and may pose security risks.

33
Q

What are some potential indicators of a malware attack?

A

Extra traffic, data exfiltration, encrypted traffic, traffic to specific IPs, and outgoing spam.

34
Q

What are Human Vectors?

A

Attacks that target people through manipulation and deception rather than technical exploits.

35
Q

What is Social Engineering?

A

Psychological manipulation used to trick people into giving sensitive info or access.

36
Q

What is Impersonation?

A

Pretending to be someone trusted to gain unauthorized access or information.

37
Q

What is Shoulder Surfing?

A

Observing someone’s private info by watching over their shoulder.

38
Q

What is Disinformation?

A

Intentionally spreading false information to mislead or manipulate.

39
Q

What is Tailgating?

A

Gaining physical access by closely following someone with authorized entry.

40
Q

What is Dumpster Diving?

A

Retrieving discarded data from trash to gain useful or sensitive information.

41
Q

What is Watering Hole Attack?

A

Infecting a trusted site to compromise visitors from a specific group.

42
Q

What are Business Email Compromises (BEC)?

A

A scam using fake executive email to trick employees into sending money or sensitive info.

43
Q

What is Typosquatting?

A

Registering a fake domain name that looks like a real one to trick users who mistype URLs, often for phishing or malware.

44
Q

What is Brand Impersonation?

A

Faking a trusted brand to trick users into revealing data or installing malware.

45
Q

What is Elicitation?

A

Subtle questioning techniques used to get sensitive information from someone.

46
Q

What is Pretexting?

A

Creating a fake scenario to manipulate someone into providing information or acess.

47
Q

What is Spam?

A

Unsolicited messages sent over the Internet, often for ads or scams.

48
Q

What is Spam Over Instant Messaging (SPIM)?

A

Spam sent over instant messaging platforms instead of email.

49
Q

What is Phishing?

A

Fraudulent emails or sites designed to steal personal info or install malware.

50
Q

What is Spear Phishing?

A

Targeted phishing aimed at a specific person or organization.

51
Q

What is Whaling?

A

A phishing attack targeting high-level executives using personalized and high-stakes messages.

52
Q

What is Vishing?

A

Voice phishing–using phone calls to deceive victims into giving personal or financial information.

53
Q

What is Smishing?

A

SMS-based phishing attack using fake text messages to steal info or spread malware.

54
Q

What is a Spam Filter?

A

A tool that blocks unsolicited or harmful emails from reaching your inbox.

55
Q

What is Anti-malware?

A

Software that protects against, detects, and removes malware.

56
Q

What is a Signature File?

A

A database of known malware patterns used by anti-malware to detect threats.

57
Q

What is Heuristic-based Detection?

A

Malware detection using behavior and code analysis to find new or unknown threats.

58
Q

What is a File Integrity Monitor?

A

A tool that detects unauthorized changes to files or system by comparing current and baseline states.

59
Q

What are the different aspects of Social Engineering?

A

Authority, Intimidation, Consensus, Urgency, Familiarity, and Trust.

60
Q

What are Threat Intelligence Sources?

A

Services providing data on current threats, helping organizations prevent or respond to attacks.

61
Q

What is the Open-Source Intelligence (OSINT)?

A

Intelligence collected from publicly available sources like websites, social media, and news.

62
Q

What is Close/Proprietary Intelligence?

A

Paid, exclusive threat data gathered and distributed by private cybersecurity organizations.

63
Q

What are Vulnerability Databases?

A

A public repo of known software and hardware security weaknesses.

64
Q

What is a Trusted Automated eXchange of Intelligence Information (TAXII)?

A

A secure protocol for sharing cyber threat intelligence over HTTPS.

65
Q

What is a Structured Threat Information eXpression (STIX)?

A

A structured format for representing and sharing threat intelligence in a machine-readable way.

66
Q

What is Automated Indicator Sharing (AIS)?

A

A CISA-led program that enables automatic sharing of cyber threat indicators between government and industry.

67
Q

What is the Dark Web?

A

A hidden part of the Internet accessible only with special tools, often used for anonymous and illicit activities.

68
Q

What are Public/Private Information Sharing Organizations?

A

Groups that foster cybersecurity info exchange between government and private sector.

69
Q

What are Indicators of Compromise (IoC)?

A

Forensic evidence like file hashes or IP addresses that suggest a system has been compromised.

70
Q

What is Predictive Analysis?

A

A method of using data and trends to forecast and prevent future threats.

71
Q

What are Threat Maps?

A

Visual tools that display real-time global cyberattack data to help monitor threat activity.

72
Q

What are File/Code Repos?

A

Centralized storage for source code or files, used for development, threat analysis, or secure sharing.

73
Q

What are some research sources one can consult?

A

Vendor Websites, Conferences, Local Industry Groups, Pubic/Private Sharing Centers, Academic Journals, and Request for Comments (RFC).