Security Plus - Chapter 2 Flashcards

1
Q

Script Kiddie

A

A derogatory term for an unskilled cybersecurity attacker who use hacking techniques with limited skills.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hacktivist

A

An activist that uses hacking techniques to accomplish an attack that they believe will provide a greater good for society.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Organized Crime

A

groups that perform cybersecurity attacks that occur wherever there is money to be made. List of cybercrime activities that organized crime has been determined to be involved in:
Cyber-dependent crime
Child sexual abuse material
Online fraud
Dark web
Cross-cutting crime factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nation-State Attackers

A

A governmentally organized group of attackers that attempt to attack other nations or organizations to collect political, economic, or traditional espionage information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advanced Persistent Threat (APT)

A

A series of attacks that utilize advanced tools and continue to be performed over a significant time period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Insider Attacks

A

Attacks that occur when an employee, contractor, vendor, or other individual with authorized access to information and systems uses the access to wage an attack against the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Competitive Attacks

A

Usually engage in attacks on others that are in the same industry with an advantage they want to learn about. This is similar to corporate espionage attempting to steal sensitive information from others in the same industry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Exfiltration

A

Attacks that are motivated by the desire to obtain sensitive or proprietary information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Espionage

A

Attacks that are motivated by organizations seeking to steal secret information from other organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Service Disruption

A

Attacks that seek to take down or interrupt critical systems or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blackmail Attacks

A

Attacks that seek to extort money or other concessions from victims by threatening to release sensitive information or to launch further attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Financial Gain

A

Attacks that are motivated by the desire to make money through theft of fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Philosophical/Political Beliefs

A

Attacks for ideological or political reasons. Utilized by Hacktivists usually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ethical

A

White hat hacking. A desire to expose vulnerabilities and improve security. Carried out by security researchers or ethical hackers with the permission of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Revenge

A

A desire to get even with an individual or organization by embarrassing them or expecting some other form of retribution against them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Disruption/Chaos

A

Attacks that disrupt the normal operations of an organization and could potentially cause chaos to their systems or network.

17
Q

War

A

Military units and civilian groups may use hacking in an attempt to disrupt military operations and change the outcome of an armed conflict.

18
Q

Attack Surface

A

A system, application, or service that contains a vulnerability that may be exploited.

19
Q

Threat Vector

A

The means that a threat actor uses to obtain access.

20
Q

Message Based Threat Vector

A

A type of threat vector Phishing messages, spam messages, and other email borne attacks used to gain access to an organizations network. Social media are seeing similar attacks through the use of Instant and Direct messaging to try to coerce a user to provide login credentials to the attacker.

21
Q

Wired Networks

A

Attackers attempt to access a targets network through physically entering the organizations facilities and plugging a device directly to an open port that may not be properly configured to limit the access. This also includes that an attacker can walk in and begin using an unlocked computer terminal that is open and available for activity.

22
Q

Systems

A

A type of threat vector that could provide exposure for an attacker to infiltrate the system and gain access to the desired target. Examples of this are software, applications, service ports, not updating, disabling, or modifying the default accounts or services.

22
Q

Wireless Networks

A

A type of threat vector that allows an attacker to attempt to access the network by configuring their own device to be able to connect to the target wireless network through WiFi configuration or Bluetooth enabled devices to gain access.

23
Q

Files and Images

A

Individual files including images that may have embedded malicious code that can trick a user into opening the file and activating the malware infection.

24
Q

Removable Devices

A

Attackers can use removable devices to such as USB drives to spread malware and launch attacks on their targets.

25
Q

Cloud Services

A

Attackers routinely scan popular cloud services for files with improper access controls, systems that have security flaws, or accidentally published API keys and passwords.

26
Q

Supply Chain

A

Attackers may attempt to gain access to an organization’s vendor or suppliers in order to gain access to the target. This can be done by infecting hardware or software that the vendor provides to the target organization or gaining credential access if the vendor has login credentials to the target organization’s network or systems.

27
Q

Threat Intelligence

A

The set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment.

28
Q

Predictive Analysis

A

Identifying likely risks to an organization

29
Q

Vulnerability Databases

A

Reports of vulnerabilities with assets affected and criticality to provide insight into the types of exploits being discovered by researchers.

30
Q

Indicators of Compromise

A

Telltale signs that an attack has taken place and may include file signatures, file patterns, and other evidence left behind by the attackers.

31
Q

Open Source Threat Intelligence

A

Threat intelligence that is acquired from publicly available sources.

32
Q

Dark Web

A

A network run over standard Internet connections but using multiple layers of encryption to provide anonymous communication.

33
Q

Closed Source Intelligence

A

Proprietary or exclusive information from commercial security vendors, government organizations, and other security-centric organizations that perform their own information gathering and research using custom tools, analysis models, or other proprietary methods to gather, curate, and maintain threat intelligence.

34
Q

Threat Maps

A

High level maps that provide real-time insight into the cybersecurity threat landscape.

35
Q

Assessing Threat Intelligence

A

Questions to ask:
Is the information timely?
Is the information accurate?
Is the information relevant?

36
Q

Confidence Score

A

A way to summarize the threat intelligence assessment data to filter and use threat intelligence based on much trust they give it.

37
Q

Information Sharing and Analysis Centers (ISAC)

A

Threat intelligence communities that help infrastructure owners and operators share threat information and provide tools and assistance to their members.

38
Q
A