Outsmarting Threat Actors Flashcards

1
Q

These are specific methods and patterns of activities or behaviors associated with a particular threat actor or group of threat actors.

A

Tactics, Techniques, and Procedures (TTP’s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do we learn a threat actors TTP’s? They are designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats.

A

Deception and Disruption Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the most commonly used Deception Technologies?

A

Honeypot, Honeynet, Honeyfile, Honeytoken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is a decoy system or network set up to attract potential hackers.

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This deception technology mimics an entire network to study behaviors of threat actors.

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This deception technology uses decoy files. They are placed within a system to lure in potential attackers. These serve as a trap to enumerate attackers. They can be embedded in many files including: Word Docs, Excel Spreadsheets, Presentations, Images, Database files, and executables.

A

Honeyfile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This deception technology is a piece of data or a resource that has no legitimate value or use but is monitored for access or use:

A

Honeytoken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some disruption technologies?

A

Bogus DNS, Decoy Directories, Dynamic Page Generation, Port Triggering, Fake Telemetry Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a disruption technology that uses a fake DNS entry that is introduced into a system’s DNS server?

A

Bogus DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a disruption technology that uses fake folders and files placed within a system’s storage?

A

Decoy Directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a disruption technology used in websites to present ever-changing content to web crawlers to confuse and slow down the threat actor?

A

Dynamic Page Generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a disruption technology uses a security mechanism that follows specific services or ports on a network device, remaining closed until a specific outbound traffic pattern is detected?

A

Port Triggering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a disruption technology system that can respond to an attacker’s network scan attempt by sending out fake telemetry or network data?

A

Fake Telemetry Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly