Threat Actor Flashcards

1
Q

Unskilled Attackers

A

Limited tech experience use pre scripts online to attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hacktivist

A

Attacks that are politiacl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Organized Crime

A

Ransome ware, financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nation-State Actors

A

They do espinoge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Insider Threats

A

Inside the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Honeypots

A

Decoy systems.servers designed to attract attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Honeynets

A

Entire network that is fake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Honeyfiles

A

Fake files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HoneyTokens

A

Fake credintals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Exfiltation

A

Unauthorized transfer of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internal Threat Actors

A

Insiders that are bad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Extranal Threat Actors

A

Outsiders who are attempting to breach into the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Resource and funding

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unskilled Attackers

A

An individual that lack technical knowledge that relys on scrips.AKA script kiddies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hacktivists

A

Use skills to promote a cause or drive for social change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Organized Crime

A

Well structured entities that leverage resources and tech skills for illicit gain.

17
Q

Nation-State Actor

A

Groups that are sponsored by government to attack nations, and governments etc.

18
Q

Advance Persistent Threat

A

Used with a nation state actor. Prolonged cyber attack.

19
Q

Insider Threats

A

Originates from within the org.

20
Q

Shadow IT

A

Use of IT systems without explicit approval.

21
Q

Threat Vector

A

Pathway by which an attacker can gain unauthorized access to a computer or network sending malicious payloads.

22
Q

Outsmarting Threat Actors

A
23
Q

HoneyToken

A

A honeytoken is a piece of information or a system entity that is created to serve as a decoy or alert mechanism. A honeytoken’s sole purpose is to be accessed or used illicitly, and any interaction with it is typically a clear sign of unauthorized activity, such as someone using a fake user account, a dummy email address, or a baited record in a database. It alerts the organization that someone has accessed the system.

24
Q
A
25
Q
A
26
Q
A
27
Q
A