Classifying Threats Flashcards

1
Q

An individual or group with advanced skills and funding, typically aligned with a nation’s interests.

A

Nation-state actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An attacker motivated by ideology or social change, often using public defacement or data leaks.

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An insider who intentionally or unintentionally compromises security by leaking or mishandling data.

A

Insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat actors that aim for financial gain through organized campaigns like ransomware and fraud.

A

Organized crime group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An individual who uses pre-built tools or scripts to launch attacks with little technical knowledge.

A

Script kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attacker who attempts to gain business secrets to undermine a competitor’s advantage.

A

Corporate espionage threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The type of attack in which an adversary targets a software vendor to compromise multiple clients.

A

Supply chain attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A tactic where attackers scan for open ports across a wide IP range without targeting specific victims.

A

Opportunistic scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A threat actor with defined objectives, using stealthy techniques over an extended period.

A

Advanced Persistent Threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The type of threat where third-party vendors or service providers introduce vulnerabilities.

A

Third-party risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A person who violates ethical norms but may help organizations by disclosing vulnerabilities.

A

Gray hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The cybersecurity threat resulting from unsupported operating systems or legacy equipment.

A

Obsolescence risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attack that manipulates domain name resolution to redirect traffic to malicious sites.

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A threat based on manipulating people into bypassing normal security procedures.

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A criminal that targets high-ranking officials through deceptive emails.

A

Whaling attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The threat that comes from poor configuration, weak access controls, or open services.

A

Misconfiguration

16
Q

A method of attack that simulates real adversaries to test an organization’s defenses.

A

Red teaming

17
Q

A malware type that doesn’t require user interaction and spreads across systems automatically.

18
Q

An attacker motivated by personal revenge against an employer or coworker.

A

Malicious insider

19
Q

The classification model that breaks threats down by motive, capability, and opportunity.

A

Threat actor profiling

20
Q

An attack that occurs due to accidental internal user actions, such as misdirected emails.

A

Unintentional insider threat

21
Q

A targeted threat actor with specific knowledge of the organization’s environment.

A

Insider with elevated privileges

22
Q

The concept that no user, system, or device is inherently trusted within the network.

A

Zero Trust security model

23
Q

The motivation behind ransomware gangs demanding cryptocurrency payments.

A

Financial gain

24
Q

A threat vector that relies on outdated protocols like FTP or Telnet still being enabled.

A

Insecure protocol usage

25
Q

Attackers who compromise infrastructure to remain dormant until activated.

A

Sleeper cell threat

26
Q

A person or group testing systems without permission, often for malicious purposes.

A

Black hat hacker

27
Q

The threat resulting from default passwords and unchanged credentials.

A

Credential misuse

28
Q

The threat posed by AI-generated phishing emails that closely mimic human writing.

A

AI-driven social engineering

29
Q

When attackers hijack legitimate remote access tools to avoid detection.

A

Living off the land (LotL) technique

30
Q

The type of threat that uses insider knowledge to evade traditional detection tools.

A

Insider-initiated lateral movement

31
Q

The concept of assessing a threat based on both its likelihood and potential damage.

A

Threat classification and prioritization

32
Q

An actor operating under unofficial state sponsorship, often disavowed by the government.

A

State-aligned proxy

33
Q

A threat targeting organizations using unsanctioned SaaS apps and cloud storage.

A

Shadow IT risk

34
Q

A threat actor that collects data over time for a future, larger coordinated attack.

A

Intelligence gatherer