Threat Actor Flashcards
Unskilled Attackers
Limited tech experience use pre scripts online to attack.
Hacktivist
Attacks that are politiacl
Organized Crime
Ransome ware, financial gain
Nation-State Actors
They do espinoge
Insider Threats
Inside the company.
Honeypots
Decoy systems.servers designed to attract attackers.
Honeynets
Entire network that is fake.
Honeyfiles
Fake files.
HoneyTokens
Fake credintals.
Data Exfiltation
Unauthorized transfer of data.
Internal Threat Actors
Insiders that are bad.
Extranal Threat Actors
Outsiders who are attempting to breach into the system.
Resource and funding
Unskilled Attackers
An individual that lack technical knowledge that relys on scrips.AKA script kiddies.
Hacktivists
Use skills to promote a cause or drive for social change.
Organized Crime
Well structured entities that leverage resources and tech skills for illicit gain.
Nation-State Actor
Groups that are sponsored by government to attack nations, and governments etc.
Advance Persistent Threat
Used with a nation state actor. Prolonged cyber attack.
Insider Threats
Originates from within the org.
Shadow IT
Use of IT systems without explicit approval.
Threat Vector
Pathway by which an attacker can gain unauthorized access to a computer or network sending malicious payloads.
Outsmarting Threat Actors
HoneyToken
A honeytoken is a piece of information or a system entity that is created to serve as a decoy or alert mechanism. A honeytoken’s sole purpose is to be accessed or used illicitly, and any interaction with it is typically a clear sign of unauthorized activity, such as someone using a fake user account, a dummy email address, or a baited record in a database. It alerts the organization that someone has accessed the system.