Sec+ Chapter 02: Cybersecurity Threat Landscape Flashcards

1
Q

f

Script kiddie

A

People who use hacking techniques but have limited skills

Lack of skill != not dangerous

Relies on free or automated tools from the internet, but those are impactful if you’re vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hactivists

A

Hackers who want to accomplish a specific goal

They believe they’re engaged in a just crusade, so your defense might not impact them the same way it would other threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Organized cybercriminals

A

Threat actors or groups that want to generate as much illegal profit as they can

Can be moderately or highly skilled, but have a lot of resources and money to buy the best hackers they can

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

APT

A

Advanced persistent threats

Attackers that use advanced techniques and persist in their attacks, which occur over a significant period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Nation state attack

A

Governments or nations that engage in attacks

EX: China and Russia botnets for DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Zero day attack

A

Attacks that exploit a vulnerability not known to other attackers or cybersecurity teams

Usually carried out by APT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Insider atack

A

Employee, contractor, vendor, or someone with access uses their permissions to attack an org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shadow IT

A

When someone seeks out their own tech solutions instead of using company approved ones

EX: What I did with my home computer vs laptop at Classy during pandemic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Competitor attack

A

When competitors engage in corporate espionage to steal sensitive info and use it to their business advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat vectors

A

1) Email and social media

2) Direct access

3) Wireless networks

4) Removable media

5) Cloud

6) Third party / supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat intelligence

A

Activities and resources available to learn about changes in the threat environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OSINT

A

Open source intelligence

Intel acquired from publicly available sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Closed source intelligence

A

When commercial, govt, or security orgs do their own research and maintain threat feeds with custom tools, analysis models, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 questions to assess threat intel

A

1) Is it timely?

2) Is it accurate?

3) Is it relevant?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

STIX

A

Structured threat information eXpression

XML language that defines things like motivations, abilities, capabilities, attack patterns, identities, malware, threat actors, tools, etc

Currently STIX 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OASIS

A

Organization for the advancement of structured information standards

17
Q

TAXII

A

Trusted automated eXchange of indicator information

Allows for the secure transfer of STIX data between organizations

18
Q

OpenIOC

A

Open indicators of compromise

XML based framework like STIX that includes metadata like author, name of IOC, and description of indicator

19
Q

ISACs

A

Information sharing and analysis centers

Orgs that help infrastructure owners and operators share threat info and provide tools or assistance to members

20
Q

CTA

A

Cyber threat alliance

Members upload specifically formatted threat intel

CTA scores each submission and validates across other subs

Other members can extract the validated data

21
Q

IoC

A

Indicators of compromise

Events that indicate a potential intrusion:

EX: Unusual amount of network activity, change to file hash values, irregular international traffic, DNS data changes, uncommon login patterns, etc