Explaining Threat Actors and Threat Intelligence Flashcards

1
Q

Black Hat

A

Unethical/malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

White Hat

A

Ethical hacker certified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Grey Hat

A

illegal, but no malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

script kiddie

A

someone who uses hacker tools without necessarily understanding
how they work or having the ability to craft new attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hacktivist

A

might attempt to obtain and release
confidential information to the public domain, perform denial of service (DoS) attacks,
or deface websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advanced Persistent Threat

A

coined to understand the behavior underpinning modern types of
cyber adversaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

State Actors

A

implicated in many attacks, particularly on energy and health
network systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Criminal Syndicate

A

operate across the Internet from
different jurisdictions than its victim, increasing the complexity of prosecution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack Surface

A

all the points at which a malicious threat actor could try to
exploit a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

attack vector

A

is the path that a threat actor uses
to gain access to a secure system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Supply Chain Attack Vector

A

rather than attack the target directly, a threat actor may seek
ways to infiltrate it via companies in its supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Cyber Threat Intelligence?(CTI)

A

Threat data can be packaged as feeds that integrate with a security information and
event management (SIEM) platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Open source intelligence (OSINT)

A

some companies operate threat intelligence
services on an open-source basis, earning income from consultancy rather than
directly from the platform or research effort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tactic, technique or procedure(TTP)

A

categorize behaviors in terms of campaign strategy and approach
(tactics), generalized attack vectors (techniques), and specific intrusion tools and
methods (procedures).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

indicator of compromise (IoC)

A

residual sign that an asset or network has
been successfully attacked or is continuing to be attacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Structured Threat Information eXpression (STIX)

A

art of the framework describes
standard terminology for IoCs and ways of indicating relationships between them

17
Q

Trusted Automated eXchange
of Indicator Information (TAXII)

A

provides a means for transmitting CTI data
between servers and clients.

18
Q

Automated Indicator Sharing (AIS)

A

service offered by the Department of
Homeland Security (DHS) for companies to participate in threat intelligence sharing

19
Q
A