Threat Actor Flashcards

SY0-701

1
Q

Threat actor

A

An individual or entity responsible for incidents that impact security and data protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat actor attributes

A

Specific characteristics or properties that define and differentiate various threat actors from one another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unskilled Attackers

A

Individuals with limited technical expertise who use readily available tools like downloaded scripts or exploits to carry out attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hactivists

A

Cyber attackers who carry out their activities driven by political, social, or environmental ideologies who often want to draw attention to a specific cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Organized crime

A

Well structured groups that execute cyberattacks from financial gain, usually through methods like ransomware, id theft, or credit card fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Nation state actors

A

Highly skilled attackers that are sponsored by governments to carry out cyber espionage, sabotage, or cyber warfare against other nation states or specific targets in a variety of industries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Insider threates

A

Threats that occur from within the org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Shadow IT

A

IT systems, devices, software, applications, and services that are managed an utilized without explicit org approval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Honeypots

A

Decoy systems or servers designed to attract and deceive potential attackers, simulating real world IT assets to study their techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Honeynet

A

Creates an entire network of decoy systems to observe complex, multi stage attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Honey files

A

Decoy files placed within systems to detect unauthorized access or data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Honey tokens

A

Fake pieces of data, like fabricated use credential, inserted into databases or systems to alert admins when they are accessed or used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly