security plus Flashcards

definitions and question

1
Q

Threat actor

A

A person or entity responsible for an event that has been identified as a security incident or as a risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internal/external

A

The degree of access that a threat actor possesses before initiating an attack. An external threat actor has no standing privileges, while an internal actor has been granted some access permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Level of sophistication/capability

A

A formal classification of the resources and expertise available to a threat actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Resources/funding

A

The ability of threat actors to draw upon funding to acquire personnel, tools, and development of novel attack types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Service disruption

A

A type of attack that compromises the availability of an asset or business process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data exfiltration

A

The process by which an attacker copies data from a private network to an external network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disinformation

A

A type of attack that falsifies an information resource that is normally trusted by others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blackmail

A

Demanding payment to prevent the release of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Extortion

A

Demanding payment to prevent or halt some type of attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fraud

A

Falsifying records, such as an internal fraud that involves tampering with accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hacker

A

Often used to refer to someone who breaks into computer systems or spreads viruses. Ethical hackers prefer to think of themselves as experts on and explorers of computer security systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unauthorized hacker

A

A hacker operating with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authorized hacker

A

A hacker engaged in authorized penetration testing or other security consultancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unskilled attacker

A

An inexperienced attacker that typically uses tools or scripts created by others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hacktivist

A

A threat actor that is motivated by a social issue or political cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advanced persistent threat (APT)

A

An attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.

17
Q

Nation-state actors

A

A type of threat actor that is supported by the resources of its host country’s military and security services.

18
Q

Organized crime

A

A type of threat actor that uses hacking and computer fraud for commercial gain.

19
Q

Internal threat

A

A type of threat actor who is assigned privileges on the system that cause an intentional or unintentional incident.

20
Q

Unintentional or inadvertent insider threat

A

A threat actor that causes a vulnerability or exposes an attack vector without malicious intent.

21
Q

Shadow IT

A

Computer hardware, software, or services used on a private network without authorization from the system owner.

22
Q

Vulnerable software

A

Weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

23
Q

Unsupported systems

A

Product life cycle phase where mainstream vendor support is no longer available.

24
Q

Unsecure network

A

Configuration that exposes a large attack surface, such as through unnecessary open service ports, weak or no authentication, use of default credentials, or lack of secure communications/encryption.

25
Q

Lure

A

An attack type that will entice a victim into using or opening a removable device, document, image, or program that conceals malware.