Security Plus - Chapter 2 Flashcards
Script Kiddie
A derogatory term for an unskilled cybersecurity attacker who use hacking techniques with limited skills.
Hacktivist
An activist that uses hacking techniques to accomplish an attack that they believe will provide a greater good for society.
Organized Crime
groups that perform cybersecurity attacks that occur wherever there is money to be made. List of cybercrime activities that organized crime has been determined to be involved in:
Cyber-dependent crime
Child sexual abuse material
Online fraud
Dark web
Cross-cutting crime factors
Nation-State Attackers
A governmentally organized group of attackers that attempt to attack other nations or organizations to collect political, economic, or traditional espionage information.
Advanced Persistent Threat (APT)
A series of attacks that utilize advanced tools and continue to be performed over a significant time period.
Insider Attacks
Attacks that occur when an employee, contractor, vendor, or other individual with authorized access to information and systems uses the access to wage an attack against the organization.
Competitive Attacks
Usually engage in attacks on others that are in the same industry with an advantage they want to learn about. This is similar to corporate espionage attempting to steal sensitive information from others in the same industry.
Data Exfiltration
Attacks that are motivated by the desire to obtain sensitive or proprietary information.
Espionage
Attacks that are motivated by organizations seeking to steal secret information from other organizations.
Service Disruption
Attacks that seek to take down or interrupt critical systems or networks.
Blackmail Attacks
Attacks that seek to extort money or other concessions from victims by threatening to release sensitive information or to launch further attacks.
Financial Gain
Attacks that are motivated by the desire to make money through theft of fraud.
Philosophical/Political Beliefs
Attacks for ideological or political reasons. Utilized by Hacktivists usually.
Ethical
White hat hacking. A desire to expose vulnerabilities and improve security. Carried out by security researchers or ethical hackers with the permission of the organization.
Revenge
A desire to get even with an individual or organization by embarrassing them or expecting some other form of retribution against them.