Lesson 2: Compare Threat Types Flashcards
Define ‘Risk’
Likelihood/consequence of a threat actor exercising a vulnerability.
What is the reason for calculating risk?
To determine the likelihood/imapct that a successful exploit would have.
Define a ‘Vulnerability’
A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.
List examples of a vulnerability
Misconfiguration of hardware/software or network device; out-of-date software/firmware; poor network architecture; inadequate policies.
What determines how vulnerable an asset is?
The value of the asset and ease of exploiting the fault.
Define a ‘Threat’
Attack vector; The potential for someone/something to exploit a vulnerability and breach security intentionally or unintentionally.
Define an external threat actor
Has no authorized access to the target system; Infiltrates the security system using unauthorized access.
Define an internal threat actor
Was granted permissions on the system; Typically an employee, contractors or business partners.
What are general motivations for perpetrating a cyber attack?
Greed/Financial, Curiosity/Chaos, Grievance/Revenge, Political
List 3 general strategies/method threat actors use to perpetrate a cyber attack
- Service Disruption
- Data exfiltration
- Disinformation
Define ‘Service Disruption’
Type of attack that compromises the availability of an asset or business process.
Define ‘Data Exfiltration’
Process by which an attacker takes data stored in a private network and moves it to an external network without authorization.
Define ‘Disinformation’
Type of attack that falsifies an information resource that is normally trusted by others.
List examples of a disinformation attack
Changing the content of a website; Manipulating search engines to inject fake sites; Using bots to post false information to social media sites.
Define a ‘Hacktivist’
Threat actor motivated by a social issue or political cause.
Define an advanced persistent threat (APT)
Ability of an adversary to achieve ongoing compromise of network security (obtaining and maintaining access).
Define a ‘Nation-state actor’
Threat actor that is supported by the resources of its host country’s military and security services.
What are the typical targets of nation-state actors?
Energy, health, and electoral systems/organizations.
What are the typical goals of nation-state actors?
Primarily disinformation and espionage for strategic advantage - typically not for financial reason.
What is ‘Shadow IT’?
Computer hardware, software, or services used on a private network without authorization from the system owner.
What are the typical motivations/goals of an internal/insider threat actor?
Revenge and Financial gain.
Which three types of threat actor are most likely to have high levels of funding?
State actors, organized crime, and competitors.
Define an ‘Attack Surface’
All the points at which a malicious threat actor could try to exploit a vulnerability.
What are examples of what could be apart of an attack surface?
Any location or method where a threat actor can interact with a network port, application, computer, or user.
Define the process of minimizing attack surface
Restricting access so that only trusted endpoints, protocols/ports, and services are permitted.
Define a ‘Threat Vector’
A specific path a threat actor uses to gain unauthorized access to a system.
Define ‘Vulnerable software’
Contains a flaw in its code or design that can be exploited to circumvent access control or to crash the process.
Define an ‘Unsupported System/Application’
System/Application whose vendor no longer develops updates and patches for the product.
What are the two vectors a software vulnerability is exploited?
- Remote
- Local