Lesson 2: Compare Threat Types Flashcards

1
Q

What is a vulnerability?

A

A weakness in a system that can be exploited, such as insecure passwords or software flaws.
This can lead to unauthorized access or data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a threat refer to in cybersecurity?

A

The potential for a vulnerability to be exploited, often carried out by a threat actor or vector.
Understanding the nature of the threat is crucial for Risk Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define risk in the context of cybersecurity.

A

The combination of the likelihood of a vulnerability being exploited and the potential impact of such an exploitation.
Risk assessment is essential for prioritizing security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What distinguishes internal threat actors from external threat actors?
Provide examples of each

A

Internal threat actors have authorized access, while external actors must breach security measures.
Internal: Employees
External: Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do the sophistication and capability of threat actors vary?

A

They range from amateurs using basic tools to sophisticated groups employing advanced techniques, often influenced by their resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of funding may high-capability threat actors have?

A

They may be state-sponsored or part of organized crime, providing significant resources for their activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are hackers?

A

Individuals who gain unauthorized access to systems, categorized into ethical (white hat) and malicious (black hat) hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who are hacktivists?

A

Groups that use hacking to promote political agendas, often through service disruptions or data leaks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are nation-state actors known for?

A

Engaging in advanced persistent threats (APTs) for espionage and disinformation, often with significant resources and capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the definition of an attack surface?

A

The attack surface encompasses all points in a system that are vulnerable to exploitation.
This includes network ports, applications, and user interactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a threat vector?

A

The specific path taken by threat actors to exploit vulnerabilities.
This can include multistage campaigns and novel attack methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List key vectors of attack.

A
  • Vulnerable Software
  • Unsupported Systems
  • Network Vectors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain the Vulnerable Software vector of attack?

A

Software flaws can be exploited to bypass access controls; regular patching and system consolidation are essential for mitigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain the Unsupported Software vector of attack?

A

Systems that are no longer updated pose a high risk due to unpatched vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the Network Software vector of attack?

A

Include remote exploits (no credentials needed) and local exploits (require unauthenticated sessions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are lure-based vectors?

A

Involve removable devices (e.g., USB drives with malware) and malicious file types that trick users into executing harmful code.

17
Q

What are message-based vectors?

A

Utilize email, SMS, and social media to deliver phishing attacks, often containing malicious links or attachments.

18
Q

Define social engineering.

A

Exploits human psychology to manipulate individuals into divulging confidential information or performing actions that compromise security.

19
Q

What are key techniques used in social engineering?

A
  • Impersonation: Pretending to be someone else
  • Pretexting: Creating a fabricated scenario to gain trust
20
Q

What is phishing?

A

A common tactic where attackers send spoofed messages to trick users into revealing credentials.

21
Q

What are Vishing and SMiShing?

A

Voice-based and text message phishing, respectively, targeting victims through different communication channels.

22
Q

What is business email compromise?

A

Targeted attacks against executives to gain access to sensitive information or funds.

23
Q

What are some mitigation strategies for social engineering?

A
  • Training employees to recognize tactics
  • Monitoring email systems
  • Securing web interactions