Explain different threat actors, vectors, and intelligence sources Flashcards

1
Q

What is Actors and threats

A

Actor == The person or entity responsible for an event that has been identified as a security incident or as a risk.
Threat == The potential for an entity to exercise a vulnerability (that is, to breach security).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Advanced persistent threat (APT)

A

An attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Insider threats

A

A type of threat actor who is assigned privileges on the system that cause an intentional or unintentional incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is State actors

A

A type of threat actor that is supported by the resources of its host country’s military and security services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Hacktivists

A

An threat actor that is motivated by a social issue or political cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Script kiddies

A

An inexperienced, unskilled attacker that typically uses tools or scripts created by others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Criminal syndicates

A

A type of threat actor that uses hacking and computer fraud for commercial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Hackers

A

Often used to refer to someone who breaks into computer systems or spreads viruses, Ethical Hackers prefer to think of themselves as experts on and explorers of computer security systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Authorized Hacker/White hat

A

A hacker engaged in authorized penetration testing or other security consultancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Unauthorized Hacker/Black hat

A

An unauthorized hacker operating with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Semi-authorized Hacker/Grey hat

A

An unauthorized hacker operating with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Shadow IT

A

Computer hardware, software, or services used on a private network without authorization from the system owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Competitors

A

A rival using hacks to gain advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Attributes of actors

A

Internal/External.
Intent/Motivation.
Level of Sophistication/Capability.
Resources/Funding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Internal/external

A

External == No account or authorized access to the target system.

Internal == One that has been granted permissions on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What isLevel of sophistication/capability

A

Level of sophistication == The ability to gather resources.

Capability == Refers to a threat actor’s ability to craft novel exploit techniques and tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Resources/funding

A

Resources == Customized attack tools and skilled strategists, designers, coders, hackers, and social engineers.
Funding == Access to money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Intent/motivation

A

Intent == What an attacker hopes to achieve from the attack.

Motivation == Why the attacker is attacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Attack Vectors

A

A specific path by which a threat actor gains unauthorized access to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Direct access

A

This is a type of physical or local attack. The threat actor could exploit an unlocked workstation, use a boot disk to try to install malicious tools, or steal a device, for example.

21
Q

What is Wireless

A

The attacker either obtains credentials for a remote access or wireless connection to the network or cracks the security protocols used for authentication. Alternatively, the attacker spoofs a trusted resource, such as an access point, and uses it to perform credential harvesting and then uses the stolen account details to access the network.

22
Q

What is Email

A

The attacker sends a malicious file attachment via email, or via any other communications system that allows attachments. The attacker needs to use social engineering techniques to persuade or trick the user into opening the attachment.

23
Q

What is Supply chain

A

Rather than attack the target directly, a threat actor may seek ways to infiltrate it via companies in its supply chain. One high-profile example of this is the Target data breach, which was made via the company’s HVAC supplier.

24
Q

What is Social media

A

Malware may be concealed in files attached to posts or presented as downloads. An attacker may also be able to compromise a site so that it automatically infects vulnerable browser software (a drive-by download). Social media may also be used more subtly, to reinforce a social engineering campaign and drive the adoption of Trojans.

25
Q

What is Removable media

A

The attacker conceals malware on a USB thumb drive or memory card and tries to trick employees into connecting the media to a PC, laptop, or smartphone. For some exploits, simply connecting the media may be sufficient to run the malware. In many cases, the attacker may need the employee to open a file in a vulnerable application or run a setup program.

26
Q

What is Cloud

A

Many companies now run part or all of their network services via Internet-accessible clouds. The attacker only needs to find one account, service, or host with weak credentials to gain access. The attacker is likely to target the accounts used to develop services in the cloud or manage cloud systems. They may also try to attack the cloud service provider (CSP) as a way of accessing the victim system.

27
Q

What is Threat intelligence sources

A
Open source intelligence (OSINT)
Closed/proprietary
Vulnerability databases
Public/private information-sharing centers
Dark web
Indicators of compromise
Automated indicator sharing (AIS)
28
Q

What is Open source intelligence (OSINT)

A

Some companies operate threat intelligence services on an open-source basis, earning income from consultancy rather than directly from the platform or research effort.

29
Q

What is Closed/proprietary

A

The threat research and CTI data is made available as a paid subscription to a commercial threat intelligence platform. The security solution provider will also make the most valuable research available early to platform subscribers in the form of blogs, white papers, and webinars.

30
Q

What is Vulnerability databases

A

A platform aimed at collecting, maintaining, and disseminating information about discovered computer security vulnerabilities.

31
Q

What is Public/private information-sharing centers

A

In many critical industries, Information Sharing and Analysis Centers (ISACs) have been set up to share threat intelligence and promote best practice. These are sector-specific resources for companies and agencies working in critical industries, such as power supply, financial markets, or aviation. Where there is no coverage by an ISAC, local industry groups and associations may come together to provide mutual support.

32
Q

What is Dark web

A

Resources on the Internet that are distributed between anonymized nodes and protected from general access by multiple layers of encryption and routing.

33
Q

What isIndicators of compromise

A

A sign that an asset or network has been attacked or is currently under attack.

34
Q

What is Automated indicator sharing (AIS)

A

Is a service offered by the Department of Homeland Security (DHS) for companies to participate in threat intelligence sharing (us-cert.gov/ais). It is especially aimed at ISACs, but private companies can join too. AIS is based on the STIX and TAXII standards and protocols.

35
Q

What is Structured Threat Information eXpression (STIX)/Trusted Automated eXchange of Indicator Information (TAXII)

A

STIX an XML structured language for expressing and sharing threat intelligence. Like TAXII, STIX is a community-driven project currently led and sponsored by the office of Cybersecurity and Communications at the United States DHS.

Trusted Automated eXchange of Indicator Information (TAXII™) is a free and open transport mechanism that standardizes the automated exchange of cyber threat information.

36
Q

What is Predictive analysis

A

Identifying the signs of a past attack or the presence of live attack tools on a network quickly is valuable. However, one of the goals of using AI-backed threat intelligence is to perform predictive analysis, or threat forecasting. This means that the system can anticipate a particular type of attack and possibly the identity of the threat actor before the attack is fully realized.

37
Q

What is Threat maps

A

Is an animated graphic showing the source, target, and type of attacks that have been detected by a CTI platform. The security solutions providers publish such maps showing global attacks on their customers’ systems

38
Q

What is File/code repositories

A

A file/code repository such as virustotal.com holds signatures of known malware code. The code samples derive from live customer systems and (for public repositories) files that have been uploaded by subscribers.

39
Q

What is Research sources

A
Academic journals
Conferences
Request for Comments (RFC)
Social media
Vendor websites
Vulnerability feeds
Local industry groups
Adversary tactics, techniques, and procedures
Threat feeds
40
Q

What is Vendor websites

A

The website if the vendor.

41
Q

What is Vulnerability feeds

A

As well as analyzing adversary tools and behaviors, another source of threat intelligence is identifying vulnerabilities in OS, software application, and firmware code. Security researchers look for vulnerabilities, often for the reward of bug bounties offered by the vendor. Lists of vulnerabilities are stored in databases such as Common Vulnerabilities and Exposures (CVE), operated by Mitre (cve.mitre.org). Information about vulnerabilities is codified as signatures and scanning scripts that can be supplied as feeds to automated vulnerability scanning software.

42
Q

What is Conferences

A

Security conferences are hosted and sponsored by various institutions and provide an opportunity for presentations on the latest threats and technologies.

43
Q

What is Academic journals

A

Results from academic researchers and not-for-profit trade bodies and associations, such as the IEEE, are published as papers in journals. Access to these papers is usually subscription-based. One free source is the arXiv preprint repository (arxiv.org/list/cs.CR/recent). Preprints are papers that have not been published or peer reviewed.

44
Q

What is Request for comments (RFC)

A

Request for Comments (RFC)—when a new technology is accepted as a web standard, it is published as an RFC by the W3C (rfc-editor.org). There are also informational RFCs covering many security considerations and best practices.

45
Q

What is Local industry groups

A

Local industry partnerships to share info and data.

46
Q

What is Social media

A

Companies and individual researchers and practitioners write informative blogs or social media feeds. There are too many useful blog and discussion sources to include here, but the list curated by Digital Guardian (digitalguardian.com/blog/top-50-infosec-blogs-you-should-be-reading) is a good starting point.

47
Q

What is Threat feeds

A

Signatures and pattern-matching rules supplied to analysis platforms as an automated feed.

48
Q

What is Adversary tactics, techniques, and procedures (TTP)

A

Is a generalized statement of adversary behavior. The term is derived from US military doctrine (mwi.usma.edu/what-is-army-doctrine). TTPs categorize behaviors in terms of campaign strategy and approach (tactics), generalized attack vectors (techniques), and specific intrusion tools and methods (procedures).