Key Concepts Flashcards

1
Q

Attribution is always a straightforward process, with clear evidence pointing to a single group. True or false

A

False - attribution is very difficult to assign to a group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the E stand for in F3EAD?

A

Find
Fix
Finish
Exploit
Analyse
Disseminate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat group actors are never motivated by political or ideological factors? T/f

A

False - hacktivists follow ideology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why do we look at entry and exit points?
- To identify when/where data enters and exits a system
-To identify where data exits and enters a system AND where users acces the system
- in order to direct the data ourselves
-to identify where users access the system

A

To identify where data exits and enters a system AND where users access the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two separate areas where these type of IOCs can be generated from?
- host based and network based indicators
-encryption based and network based indicators
- host based and computer based indicators
- system based and encryption based indicators

A

host based and network based indicators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of using a drive-by-download attack in cybersecurity?
-to compromise a website frequented by the target
- to disrupt the targets operations
- to steal sensitive data
- to install malware on the targets device

A
  • to install malware on the targets device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which threat actor is considered to have the greater capability and motivation?
- hacktivists
- insider threat
- nation state actors
- Cyber Criminals

A

Nation state actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main goal of a zero day vulnerability?
- to steal sensitive data
- to disrupt the targets operations
- to install malware on the targets device
- to blackmail the target

A

To install malware on the targets device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can understanding of a threat actors motivation be used to inform threat intelligence analysis and response?
-by enabling the creation of more accurate threat models
- all of these are correct
- by informing the development of more effective countermeasures
- by identifying the most likely targets and methods of attack
- by facilitating attribution of attacks to specific groups or actors

A

All of these

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of these is not a decision making loop?
- intelligence cycle
- F3EAD
- FFS cycle
- OODA Loops

A

Ffs cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does IPE stand for?

A

Intelligence Preparation of the Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the common technique used by APT threat actors use to gain initial access to the network?
DDoS, vulnerability exploitation, supply chain attacks or social engineering

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is the most likely intent of a state sponsored threat actor?
Financial gain, political espionage, create mayhem, all of these are correct, Hacktivism

A

Political espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which hat colour refers to hackers that hack without consent but stop short of malicious activities?
White, grey, black or green?

A

Grey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hactivist ideology always opposes the nation state? True or false

A

False- hacktivists ideology varies from Ukraine war to whales at sea world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does IPB stand for?

A

Intelligence preparation of the battlefield

17
Q

The process of attribution can be influenced by biases including cultural and political? T/F

A

True

18
Q

What is a nations state actor motivation?
Financial gain, ideology, intellectual property theft, boredom

A

IP theft

19
Q

What do we mean by utility of scale?

A

A way of categorising hackers by concepts from unsophisticated to sophisticated

20
Q

What is the difference between IPB and IPE?

A

IPE focuses on the environment in isolation from the adversary

21
Q

What is the objective of the sterile corridor?
- to further data collection
- to analyse data
- to explain aspects of intelligence to other members of the intelligence team
- to obscure aspects of an intelligence activity to members of the intelligence team

A

to obscure aspects of an intelligence activity to members of the intelligence team

22
Q

What do we mean by utility of scale?
- presenting security of a document
- measuring intelligence report accurately
- categorising hackers by sophistication
- a way to measure DDoS

A

Categorising hackers by sophistication

23
Q

Should you consider insider threat as a threat actor or threat vector

A

Threat vector

24
Q

What was the CBEST narrative structure developed for?

A

To communicate something technical to a non technical audience

25
Q

What is the purpose of IPB?
-prepare for war
- explain operations to a non CTI analyst
-gain access onto enemy system
- analyse mission variables in the area of interest to determine the effect on operations

A

Analyse mission variables in the area of interest to determine the effect on operations

26
Q

What are the principles of intelligence? Crosscat

A

Centralised responsive objective systematic sharing continuous review accessible timely

27
Q

What is the purpose of a drive by download attack

A

To install malware on the targets device

28
Q

What is the purpose of a supply chain attack as a technique?

A

To steal sensitive data

29
Q

What is the difference between a threat actors intent and their capability?

A

Intent refers to what the attacker wants to achieve, while capability refers to their ability to achieve it

30
Q

What are some of the challenges of measuring threat actor motivation?

A

Available information may be incomplete or misleading. Motivation is often subjective and difficult to quantify. Difficult to distinguish between different threat actors and their motivations. Many threat actors are adept at deception and hiding their true intentions.