Domain 2 Flashcards
Nation State
Country’s Government that uses cyber attacks to disrupt or steal information from another country. High Skill. Motivation Espionage, Disruption, Power. Example - Stealing intellectual property from a foreign competitor
Unskilled Attacker
Someone with limited technical knowledge who may launch attacks out of curiosity or malice. Low. Malice, Curiosity. Launching a phishing campaign against random email addresses
Hacktivist
To promote a political or social cause. Varies skill. Values (Political/Social). Example leaking sensitive data from a corporation they believe is unethical
Insider Threat
Authorised Internal user who intentionally or unintentionally misuses their access to harm a system or organisation. Varies (Financial Gain, Espionage, Disgruntled employee). Selling customer data
Organised Crime
A criminal syndicate that uses cyberattacks for financial gain, such as stealing money or data. High Sill. Financial Gain (Extortion or Fraud). Example Ransomware attack on a major hospital chain
Shadow IT
Employees leveraging unauthorised or unmanaged IT resources used within an organisation, which can create security vulnerabilities. Varies. Productivity
Data Exfiltration’s
Unauthorised removal of sensitive or proprietary information from computer system
Espionage
Goal of stealing confidential information from another organisation
Service Disrption
Causing Outages
Blackmail
Threat to expose sensitive information
Financial Gain
Steal money or valuables
Political belief
Driven by ideological or political motivations
Ethical Hacking
Authorised Stimulated attacks
Revenge
Retaliate against previous activity
Disruption/Chaos
Aimed at causing widespread disruption
War
Disrupt Enemy military operations
Threat Vector
Method or Combination of methods that attacker use to gain unauthorised access to a computer system, network or data
Attack Surface
Sum total of all the possible entry points.
Authority
Citing Position, Responsibility or affiliation that grants the attacker the authority to make the request
Intimidation
Suggesting you may face negative outcomes
Consensus
Claiming that someone is in a similar position
Famililarity
Attempting personal connection
Trust
Citing Knowledge and experience
Urgency
Time sensitivity that demands immediate action
Spear Phishing
Targets Specific group of users
Whaling
Targets high level executives
Vishing
Voice based Phishing
Smishing
SMS based messaging
Pretexting
Attacker tries to convince a victim to give up information of value, or access to a service or system
Watering Hole
Attackers compromise a legitimate website frequently visited by a target grou
Brand Impersonation
Attacker creates websites, social media accounts, or email that closely resemble those of a legitimate brand
Typosquatting
Typing incorrect website address. URL Hijacking
Vulnerability
Weakness in system
Threat
Potential event that could exploit the vulnerability
Exploit
Specific Method/tool used to take advantage of a vulnerability
Attack
Actual attempt