Module 1 Flashcards
The Danger
Connecting to a rogue wireless network (hotspot) is also called…
Rogue wireless hotspots are also known as “evil twin” hotspots
What is Ransomware? How does it work and who does it affect?
Typically, employees of an organization. Attachments are generally opened, that installs ransomware (company data collected). Goal is financial from the attacker.
What is malware? How is it different from a worm?
What is a threat actor? What are the main groups are threat actors?
Malicious actor that is an entity that is partially or fully responsible for security incident that impacts or has the potential to impact an organizations security. Hackers, Hacktivist, state sponsored, or insider threat, terrorist groups, amateurs or organized crime.
Amateurs - few notes
Script kiddies, they often use tools or instructions found on the internet. Use basic skills, sometimes with devastating results.
Hacktivists
Think activist - publicly protest against a variety of social and political ideas. They leak sensitive information, and disrupt web services with illegitimate traffic in DDoS attacks.
Financial Gain
Much of the hacking activity is motivated by financial gain.
Trade Secrets and Global Politics
Nation states hack each other, intellectual property is a significant advantage in the international trade.
IoT - what is it and how is it a problem
Many devices are not updated with the latest firmware.
Threat Impact - PII, PHI and PSI
Personally Identifiable Information (name, SSN, birthdate, credit care numbers), Personal Health Information and Personal Security Information (usernames, passwords).