Session 12: Threats Flashcards

1
Q

What are Cyber Threats?

A

Malicious activity aimed at damaging or stealing data or distrupting service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sources to Cyber security threats?

A
  1. Nation states
  2. Corporate spies
  3. Criminal groups
  4. Terrorists groups
  5. Hackers
  6. Hacktivists
  7. Malicious insiders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain each cyber security threats sources?

A
  • Nation states: Goverments or countries that may engage in cyber activities, often for espionage, political influence, or warfare.
  • Corporate spies: Individuals or group hired to steal trade secrets or confidential information from competitors for competitive or financial advantage.
  • Criminal groups: Organized entities that commit cybercrimes, such as theft, fraud, or ransomware attacks, for financial gain
  • Terrorist groups: Organizations that use cyber attacks to promote fear, distrupt systems, or advance political or ideological agendas.
  • Hackers: Individuals skilled in programming and systems, who may exploit vulnerabilities for personal, ethical, or malicious purposes.
  • Hacktivists: Hackers who use cyberattacks to promote political, social, or ideological causes, often targeting governments or corporation.
  • Malicious Insiders: Employees or associates of an organization who exploit their access to compromise sustems or steal sensitive information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Common threats?

A
  • Worms (replicate itself)
  • Trojan horse
  • Computer virus
  • Spyware
  • botnet (DDoS attack)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the social engineering threats?

A
  1. Bating
  2. Quid Pro Quo
  3. Phishing
  4. Spear phishing
  5. Whaling
  6. Vishing
  7. Pretexting
  8. Tailgating
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the next generating threats?

A
  1. Polymorphic threats
  2. Blended threats
  3. Zero dat attack
  4. APT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly