Explain different threat actors, vectors, and intelligence sources Flashcards
What is Actors and threats
Actor == The person or entity responsible for an event that has been identified as a security incident or as a risk.
Threat == The potential for an entity to exercise a vulnerability (that is, to breach security).
What is Advanced persistent threat (APT)
An attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.
What is Insider threats
A type of threat actor who is assigned privileges on the system that cause an intentional or unintentional incident.
What is State actors
A type of threat actor that is supported by the resources of its host country’s military and security services.
What is Hacktivists
An threat actor that is motivated by a social issue or political cause.
What is Script kiddies
An inexperienced, unskilled attacker that typically uses tools or scripts created by others.
What is Criminal syndicates
A type of threat actor that uses hacking and computer fraud for commercial gain.
What is Hackers
Often used to refer to someone who breaks into computer systems or spreads viruses, Ethical Hackers prefer to think of themselves as experts on and explorers of computer security systems.
What is Authorized Hacker/White hat
A hacker engaged in authorized penetration testing or other security consultancy.
What is Unauthorized Hacker/Black hat
An unauthorized hacker operating with malicious intent.
What is Semi-authorized Hacker/Grey hat
An unauthorized hacker operating with malicious intent.
What is Shadow IT
Computer hardware, software, or services used on a private network without authorization from the system owner.
What is Competitors
A rival using hacks to gain advantage.
What is Attributes of actors
Internal/External.
Intent/Motivation.
Level of Sophistication/Capability.
Resources/Funding.
What is Internal/external
External == No account or authorized access to the target system.
Internal == One that has been granted permissions on the system.
What isLevel of sophistication/capability
Level of sophistication == The ability to gather resources.
Capability == Refers to a threat actor’s ability to craft novel exploit techniques and tools.
What is Resources/funding
Resources == Customized attack tools and skilled strategists, designers, coders, hackers, and social engineers.
Funding == Access to money.
What is Intent/motivation
Intent == What an attacker hopes to achieve from the attack.
Motivation == Why the attacker is attacking.
What is Attack Vectors
A specific path by which a threat actor gains unauthorized access to a system.
What is Direct access
This is a type of physical or local attack. The threat actor could exploit an unlocked workstation, use a boot disk to try to install malicious tools, or steal a device, for example.
What is Wireless
The attacker either obtains credentials for a remote access or wireless connection to the network or cracks the security protocols used for authentication. Alternatively, the attacker spoofs a trusted resource, such as an access point, and uses it to perform credential harvesting and then uses the stolen account details to access the network.
What is Email
The attacker sends a malicious file attachment via email, or via any other communications system that allows attachments. The attacker needs to use social engineering techniques to persuade or trick the user into opening the attachment.
What is Supply chain
Rather than attack the target directly, a threat actor may seek ways to infiltrate it via companies in its supply chain. One high-profile example of this is the Target data breach, which was made via the company’s HVAC supplier.
What is Social media
Malware may be concealed in files attached to posts or presented as downloads. An attacker may also be able to compromise a site so that it automatically infects vulnerable browser software (a drive-by download). Social media may also be used more subtly, to reinforce a social engineering campaign and drive the adoption of Trojans.