Domaine 2 : Menaces, vulnérabilités et atténuations Flashcards
What are Script Kiddies?
Inexperienced individuals using existing tools to exploit vulnerabilities without understanding the underlying systems.
Script Kiddies often rely on user-friendly hacking tools created by others.
What is the primary motivation of Hacktivists?
Promoting political agendas through unauthorized access or disruption of systems.
Hacktivism often involves activism or protest against perceived injustices.
What distinguishes Organized Crime in the context of cyber threats?
Groups engaging in cybercrime for financial gain, often employing sophisticated techniques.
Organized Crime can include activities like identity theft, credit card fraud, and ransomware attacks.
Who are Nation-State Actors?
Government-sponsored entities conducting cyber-espionage or cyber-attacks to achieve national objectives.
Nation-State Actors often target critical infrastructure and sensitive data.
What role do Insiders play in cybersecurity threats?
Employees or associates with authorized access who intentionally or unintentionally compromise security.
Insider threats can be particularly challenging to detect and mitigate.
How can Competitors exploit cyber vulnerabilities?
By seeking to gain an advantage through unauthorized access to proprietary information.
This can include industrial espionage and data theft.
What does the motivation of a threat actor indicate?
Understanding the intent behind an attack helps in anticipating and mitigating threats.
Motivations can range from financial gain to ideology.
Why are resources important in assessing threat actors?
The level of funding and tools available to the threat actor influences the sophistication of attacks.
More resources can lead to more advanced and damaging cyber attacks.
What do capabilities refer to in the context of threat actors?
Technical skills and knowledge determine the potential impact of the threat actor.
Capabilities can include programming skills, access to hacking tools, and experience.
What does intent clarify regarding threat actors?
Whether the actor aims to disrupt, steal, or damage assets.
Understanding intent can help organizations tailor their defenses.
What is meant by opportunity in assessing threat actors?
Access to systems or vulnerabilities that can be exploited.
Opportunity can arise from poor security practices or unpatched software.
How should organizations assess potential threat actors?
By analyzing their motivations, resources, capabilities, intent, and opportunity.
This assessment helps in prioritizing and implementing effective security measures.
What are common messaging systems exploited by attackers?
Email, SMS, and instant messaging
Attackers use these systems to deliver malicious links or attachments.
What techniques do attackers use in messaging systems?
Phishing, smishing, vishing
Phishing is via email, smishing via SMS, and vishing via voice.
What types of files can contain embedded malware?
PDFs, documents, spreadsheets, executables
These file types often use macros and scripts to initiate attacks.
What is a common method for initiating attacks in files?
Macros and scripts
These can be embedded within various file formats.
How can images pose a threat?
Images, particularly SVG files, can include malicious code
This code executes when the image is viewed.
What risk do USB drives pose in terms of malware?
USB drives can introduce malware, especially as HIDs
Configured as keyboards, they can automate malicious actions.
What are air-gapped systems vulnerable to?
Physical security compromise
If physical access is gained, air-gapped systems can be infected.
What is a common issue with default credentials?
Many systems are deployed with default usernames and passwords
These can be easily exploited by attackers.
What do misconfigured services and open ports provide?
Avenues for unauthorized access
Misconfigurations can lead to security vulnerabilities.
How can supply chain vulnerabilities be exploited?
Compromising third-party software or hardware components
Trusting unverified sources can lead to widespread vulnerabilities.
What is the risk of unpatched software?
May contain known vulnerabilities
Regular updates and patch management are crucial for security.
What can open or poorly secured network ports lead to?
Unauthorized access
Proper firewall configurations and network segmentation help mitigate these risks.