Session 07: Attackers Flashcards

1
Q

Who is an attacker?

A

An individual or organization that performs malicious activity to…
destroy,
modify,
disable,
steal,
or obtain unauthorized access
…..to or use assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of attackers?

A
  1. Cyber criminals
  2. Hacktivists
  3. State-sponsored
  4. Inside threats

Cyber Criminals
* Who use technology to commit cyber-crimes with the intent of stealing confidential information or personal data and generating profits.

Hacktivists
* Carry out malicious activities to further a political agenda, religious belief, or social ideology

State-Sponsored attackers
* Individual or group that engage in cyber-attacks with the backing, support or direction of a nation-state government.

Insider Threat
* Current or formal employee, contractor, business partner, or other individuals with access to organization’s resources who misuse their access, either intentionally or unintentionally, to harm the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The 3 broad ways that Cybercriminals use computers

A
  1. Select computer as targets
  2. Use computer as weapons
  3. Using your computer as an accessory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

5 types of cybercriminals?

A
  1. Social Engineer
  2. Spear phisher
  3. Hacker
  4. Rogue Employee
  5. Ransom Artist

Social Engineer
* Someone who manipulate people into giving up confidential information or access,
* They pretending to be someone trustworthy.

Spear Phisher
* Who sends targeted and personalized phishing emails to specific individuals or organization.
* Customized to appear legitimate by including information that is familiar and relevant to the victim.

Hacker
* Who uses their technical skills to gain unauthorized access and exploit vulnerabilities in computer systems or networks.

Rogue Employee
* An individual within an organization who misuse their legitimate access to the organization resources to harm the organization.

Ransom Artist
* Who use ransomware to encrypt or lock victim’s data or system. And then demand money form the victim to restore the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Classification of Hackers?

A

1. White Hat Hackers
* Ethical hackers
* Who legally and ethically identify and mitigate security vulnerabilities in computer system, network or application.

2. Black Hat Hackers
* Who engage in hacking activities for malicious purpose and personal gain.

3. Gray Hat Hackers
* Who operate sometimes between the ethical boundaries of white hat hackers and illegal activities of black hat hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Categories of Insider threats?

A
  1. Malicious Insider
    * Intentionally use their access to sensitive data to harm the organization.
  2. Careless Insider
    * Made an unintentional threat due to human error or security policy violation.
  3. Compromised Insider
    * Insiders whose account are compromised and used by cybercriminals.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly