Key Concepts Flashcards
Attribution is always a straightforward process, with clear evidence pointing to a single group. True or false
False - attribution is very difficult to assign to a group
What does the E stand for in F3EAD?
Find
Fix
Finish
Exploit
Analyse
Disseminate
Threat group actors are never motivated by political or ideological factors? T/f
False - hacktivists follow ideology
Why do we look at entry and exit points?
- To identify when/where data enters and exits a system
-To identify where data exits and enters a system AND where users acces the system
- in order to direct the data ourselves
-to identify where users access the system
To identify where data exits and enters a system AND where users access the system
What are the two separate areas where these type of IOCs can be generated from?
- host based and network based indicators
-encryption based and network based indicators
- host based and computer based indicators
- system based and encryption based indicators
host based and network based indicators
What is the purpose of using a drive-by-download attack in cybersecurity?
-to compromise a website frequented by the target
- to disrupt the targets operations
- to steal sensitive data
- to install malware on the targets device
- to install malware on the targets device
Which threat actor is considered to have the greater capability and motivation?
- hacktivists
- insider threat
- nation state actors
- Cyber Criminals
Nation state actors
What is the main goal of a zero day vulnerability?
- to steal sensitive data
- to disrupt the targets operations
- to install malware on the targets device
- to blackmail the target
To install malware on the targets device
How can understanding of a threat actors motivation be used to inform threat intelligence analysis and response?
-by enabling the creation of more accurate threat models
- all of these are correct
- by informing the development of more effective countermeasures
- by identifying the most likely targets and methods of attack
- by facilitating attribution of attacks to specific groups or actors
All of these
Which of these is not a decision making loop?
- intelligence cycle
- F3EAD
- FFS cycle
- OODA Loops
Ffs cycle
What does IPE stand for?
Intelligence Preparation of the Environment
What is the common technique used by APT threat actors use to gain initial access to the network?
DDoS, vulnerability exploitation, supply chain attacks or social engineering
Social engineering
Which of the following is the most likely intent of a state sponsored threat actor?
Financial gain, political espionage, create mayhem, all of these are correct, Hacktivism
Political espionage
Which hat colour refers to hackers that hack without consent but stop short of malicious activities?
White, grey, black or green?
Grey
Hactivist ideology always opposes the nation state? True or false
False- hacktivists ideology varies from Ukraine war to whales at sea world