Section 3.27 Outsmarting Threat Actors Flashcards

Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces

1
Q

Outsmarting Threat Actors

DDt’s

A

One of the most effective ways to learn from the different threat actors that are attacking your network is to set up and utilise…

Deception and Disruption technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TTPs

A

Tactics, Techniques, and Procedures (TTPs)

Specific methods and patterns of activities or behaviors associated with a particular threat actor or group of threat actors

Idea is to learn the threat actors TTPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Deceptive and Disruption Technologies

MCD DN

A

Technologies designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralising threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 common deceptive and disruption technology examples

1 Honeypots

D S/N

A

Decoy system or network set up to attract potential hackers to allow defenders to study their actions without any consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4 common deceptive and disruption technology examples

2 Honeynet

A

Network of honeypots to create a more complex system that is designed to mimic an entire network of systems to study threat actor behaviors

Servers
Routers
Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 Honeyfiles

A

Decoy file placed within a system to lure in potential attackers - these watermarked files can help detect unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

4 Honeytokens

A

Piece of data or a resource that has no legitimate value or use but is monitored for access or use

Bogus URL
Fake passwords

signals an alarm for a potential security breach when used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

5 examples BDDPS

Disruption Technologies and Strategies to help secure enterprise networks

A
  1. Bogus DNS entries: Fake Domain Name System entries introduced into your system’s DNS
    server
  2. Creating decoy directories: Fake folders and files placed within a system’s storage
  3. Dynamic page generation: Effective against automated scraping tools or bots trying to index or steal content from your organization’s website
  4. Use of port triggering to hide services: Security mechanism where specific services or ports on a network device remain closed until a specific outbound traffic pattern is detected
  5. Spoofing fake telemetry data: When a system detects a network scan is being attempted by an attacker, it can be configured to respond by sending out fake telemetry or network data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly