Section 2: Threat Actors Flashcards

1
Q

Data Exfiltration

A

Unauthorized transfer of data from a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Blackmail

A

Obtaining sensitive or compromising information and threatening to release it unless demands are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Espionage

A

Spying on individuals, organizations, or nations to gather sensitive or classified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Service Disruption

A

Disrupting services to cause chaos, make a political statement, or demand a ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Financial Gain

A

Achieving profit through means such as ransomware attacks or banking trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Philosophical/Political Beliefs

A

Hacktivism driven by political, social, or environmental ideologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ethical Reasons

A

Ethical hackers motivated by improving security rather than malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Revenge

A

Targeting an entity perceived to have wronged the threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disruption/Chaos

A

Spreading malware or launching cyberattacks to create chaos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

War

A

Cyber warfare to disrupt a country’s infrastructure, compromise national security, or cause economic damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internal vs. External Threat Actors

A

Internal threats: originate from within the organization
external threats: come from outside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unskilled Attackers

A

Limited technical expertise, using readily available tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hacktivists

A

Motivated by ideological beliefs, using cyber techniques to promote causes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Organized Crime

A

Sophisticated groups executing cyberattacks for financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nation-state Actor

A

Government-sponsored, highly skilled attackers conducting cyber espionage or warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Insider Threats

A

Security threats from within the organization, potentially from disgruntled employees

17
Q

Shadow IT

A

IT systems, devices, software, or services managed without explicit organizational approval

18
Q

Message-based Attacks

A

Delivered via email, SMS, or instant messaging, often involving phishing

19
Q

Image-based attacks

A

Malicious code embedded in image files

20
Q

File-based attacks

A

Malicious files disguised as legitimate documents or software

21
Q

Voice Calls attacks

A

Vishing attacks using voice calls to extract sensitive information

22
Q

Removable Devices attacks

A

Baiting tactics involving malware-infected USB drives

23
Q

Unsecured Networks attacks

A

Exploiting vulnerabilities in wireless, wired, or Bluetooth networks

24
Q

Honeypots

A

Decoy systems to attract and deceive attackers

25
Q

Honeynets

A

Network of decoy systems to observe complex attacks

26
Q

Honeyfiles

A

Decoy files to detect unauthorized access or data breaches

27
Q

Honeytokens

A

Fake data to alert administrators when accessed or used

28
Q

Tactics, Techniques, and Procedures (TTPs)

A

Specific methods and behaviors associated with particular threat actors

29
Q

Deceptive and Disruption Technologies

A

Tools designed to mislead and neutralize attackers