Session 07: Attackers Flashcards
Who is an attacker?
An individual or organization that performs malicious activity to…
destroy,
modify,
disable,
steal,
or obtain unauthorized access
…..to or use assets.
Types of attackers?
- Cyber criminals
- Hacktivists
- State-sponsored
- Inside threats
Cyber Criminals
* Who use technology to commit cyber-crimes with the intent of stealing confidential information or personal data and generating profits.
Hacktivists
* Carry out malicious activities to further a political agenda, religious belief, or social ideology
State-Sponsored attackers
* Individual or group that engage in cyber-attacks with the backing, support or direction of a nation-state government.
Insider Threat
* Current or formal employee, contractor, business partner, or other individuals with access to organization’s resources who misuse their access, either intentionally or unintentionally, to harm the organization.
The 3 broad ways that Cybercriminals use computers
- Select computer as targets
- Use computer as weapons
- Using your computer as an accessory
5 types of cybercriminals?
- Social Engineer
- Spear phisher
- Hacker
- Rogue Employee
- Ransom Artist
Social Engineer
* Someone who manipulate people into giving up confidential information or access,
* They pretending to be someone trustworthy.
Spear Phisher
* Who sends targeted and personalized phishing emails to specific individuals or organization.
* Customized to appear legitimate by including information that is familiar and relevant to the victim.
Hacker
* Who uses their technical skills to gain unauthorized access and exploit vulnerabilities in computer systems or networks.
Rogue Employee
* An individual within an organization who misuse their legitimate access to the organization resources to harm the organization.
Ransom Artist
* Who use ransomware to encrypt or lock victim’s data or system. And then demand money form the victim to restore the data.
Classification of Hackers?
1. White Hat Hackers
* Ethical hackers
* Who legally and ethically identify and mitigate security vulnerabilities in computer system, network or application.
2. Black Hat Hackers
* Who engage in hacking activities for malicious purpose and personal gain.
3. Gray Hat Hackers
* Who operate sometimes between the ethical boundaries of white hat hackers and illegal activities of black hat hackers.
Categories of Insider threats?
- Malicious Insider
* Intentionally use their access to sensitive data to harm the organization. - Careless Insider
* Made an unintentional threat due to human error or security policy violation. - Compromised Insider
* Insiders whose account are compromised and used by cybercriminals.