SON 3 Flashcards

1
Q

Threat actors?

A

Nation-state
Unskilled attacker
Hacktivist
Insider threat β—¦ Organized crime
Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What factor determines the financial strength of a threat actor?

A

Threat actors vary in resources, with nation-states having significant funding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where can threat actors originate from?

A

Internal vs External

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What determines a threat actor’s level of sophistication?

A

Skill levels differ; nation-states and organized crime are highly skilled, while unskilled attackers have low capability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the key characteristics of a nation-state threat actor?

A

πŸ”Ή Nation-State – Government-backed cyber actor.
πŸ”Ή Goals – Political, economic, or military advantage.
πŸ”Ή Well-funded & skilled – Uses top-tier resources.
πŸ”Ή APTs – Long-term stealth attacks for spying or disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What defines an unskilled attacker, and why can they still be a threat?

A

πŸ”Ή Unskilled Attacker – Lacks expertise, uses others’ tools.
πŸ”Ή β€œScript kiddie” – Relies on pre-made scripts.
πŸ”Ή No new exploits – Can’t create advanced attacks.
πŸ”Ή Still dangerous – Easy tools + weak security = risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the key traits of organized cybercrime groups?

A

πŸ”Ή Organized Crime – Criminal groups using cyber attacks for profit.
πŸ”Ή Well-funded & strategic – Structured operations with advanced tools.
πŸ”Ή Common crimes – Fraud, identity theft, ransomware, data theft.
πŸ”Ή Targets – Banks, businesses, and individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What motivates hacktivists, and how do they operate?

A

πŸ”Ή Hacktivist – Hacker driven by political or social causes.
πŸ”Ή Tech + activism – Uses hacking for protests.
πŸ”Ή Common attacks – Website defacement, DDoS, data leaks.
πŸ”Ή Goal – Raise awareness or disrupt targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are insider threats difficult to prevent?

A

πŸ”Ή Insider Threat – Risk from people inside an organization.
πŸ”Ή Types – Malicious (intentional harm) or unintentional (careless mistakes).
πŸ”Ή Hard to detect – Insiders already have legitimate access.
πŸ”Ή Example – Phishing victim or a rogue employee stealing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is Shadow IT a security risk?

A

Shadow IT – Unapproved tech used within an organization.
πŸ”Ή Bypasses IT oversight – No security checks or compliance.
πŸ”Ή Risks – Data breaches, non-compliance, security gaps.
πŸ”Ή Examples – Unauthorized cloud storage, personal software, unsanctioned apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can attackers use messaging services to deliver threats?

A

πŸ”Ή Email – Used for phishing, malware, ransomware, and spam.
πŸ”Ή SMS (Smishing) – Phishing links or malicious content via text.
πŸ”Ή Instant Messaging (IM) – Malware or phishing attacks in real-time chats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can attackers use messaging services to deliver threats?

A

πŸ”Ή Email – Used for phishing, malware, ransomware, and spam.
πŸ”Ή SMS (Smishing) – Phishing links or malicious content via text.
πŸ”Ή Instant Messaging (IM) – Malware or phishing attacks in real-time chats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can images be used as a cyber threat vector?

A

πŸ”Ή Malicious Images – Exploits can be hidden in image files.
πŸ”Ή Viewing = Risk – Simply opening an infected image can trigger an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question: Why is opening untrusted files a security risk?

A

πŸ”Ή Embedded Malware – Files can contain hidden malicious software.
πŸ”Ή Execution = Compromise – Opening an infected file can lead to an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is vishing, and how do attackers use it?

A

πŸ”Ή Vishing – Phone-based phishing scams.
πŸ”Ή Tricks victims – Attackers impersonate trusted entities.
πŸ”Ή Goal – Steal personal info or spread malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why are USBs and other removable devices a security risk?

A

πŸ”Ή USBs & External Devices – Can carry malware.
πŸ”Ή Plugging in = Risk – May exploit system vulnerabilities.
πŸ”Ή Common attack – Auto-run malware when connected.

17
Q

How do vulnerabilities in software expose systems to attacks?

A

πŸ”Ή Client-based – Installed software can have exploitable flaws.
πŸ”Ή Agentless – Runs without installation, harder to monitor.
πŸ”Ή Risk – Unpatched or outdated software increases threats.