Threat Actor Flashcards
SY0-701
Threat actor
An individual or entity responsible for incidents that impact security and data protection
Threat actor attributes
Specific characteristics or properties that define and differentiate various threat actors from one another
Unskilled Attackers
Individuals with limited technical expertise who use readily available tools like downloaded scripts or exploits to carry out attacks
Hactivists
Cyber attackers who carry out their activities driven by political, social, or environmental ideologies who often want to draw attention to a specific cause
Organized crime
Well structured groups that execute cyberattacks from financial gain, usually through methods like ransomware, id theft, or credit card fraud
Nation state actors
Highly skilled attackers that are sponsored by governments to carry out cyber espionage, sabotage, or cyber warfare against other nation states or specific targets in a variety of industries
Insider threates
Threats that occur from within the org
Shadow IT
IT systems, devices, software, applications, and services that are managed an utilized without explicit org approval
Honeypots
Decoy systems or servers designed to attract and deceive potential attackers, simulating real world IT assets to study their techniques
Honeynet
Creates an entire network of decoy systems to observe complex, multi stage attacks
Honey files
Decoy files placed within systems to detect unauthorized access or data breaches
Honey tokens
Fake pieces of data, like fabricated use credential, inserted into databases or systems to alert admins when they are accessed or used