FUDAMENTALS OF SECURITY Flashcards

OUTSMARTING THREAT ACTORS

1
Q

LIST THE DIFFERENT METHODS USED TO DECEIVE THREAT ACTORS

A

HONEYNETS->IT IS A NETWORK OF HONEYPOTS

HONEYPOTS->DECOY SYSTEM OR NETWORK SET TO ATTRACT POTENTIAL ATTACKERS. IT MIMICS A REAL SYSTEM WITH VULNERABILITIES.

HONEYFILES-> IT IS A DECOY FILE PUT IN PLACE TO LURE POTENTIAL ATTACKERS

HONEYTOKENS->IT HAS NO LEGITIMATE VALUE BUT IT IS MONITORED FOR ACCESS USE(FAKE URL, DUMMY DATABASE)

BOGUS DNS ->FAKE DNS

DECOY DIRECTORIES

DYNAMIC PAGE GENERATION->WEBSITES WITH EVER CHANGING CONTENT TO CONFUSE AND SLOW DOWN THREAT ACTORS

PORTS TRIGGERING->SECURITY MECHANISM WHERE SPECIFIC SERVICES AND PORTS ARE CLOSED UNTIL A SPECIFIC OUTBOUND PATTERN IS DETECTED

FAKE TELEMETRY DATA -> IT RESPONDS TO THE ATTACKER SCAN OF OUR NETWORK BY SENDING FAKE TELEMETRY OR NETWORK DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DEFINE TTPs

A

TTP: TACTICS TECHNIQUES AND PROCEDURES USED BY THREAT ACTORS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly