Threat Actor Types and Attributes Flashcards

1
Q

Person using pre-existing code and scripts to hack into machines because they lack the expertise to write their own.

A

Script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Individual who is someone who misuses computer systems for a socially or politically motivated agenda. The have roots in the hacker culture and ethics.

Hacker on a mission

A

Hackivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Professionals motivated ultimately by profit. They have enough money to buy the best gear and tech. Multiple people perform specific roles: gathering data, managing exploits, and one who actually writes thwere code.

A

Organized crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An APT is an Advanced Persistent threat, these are massive security risks that can cost companies and countries millions of dollars. Nation states have very sophisticated hacking teams that target the security of other nations. They often attack military organizations or large security sites, they also frequently attack power plants.

A

Nation States / APT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Someone who is inside the company and who has intricate knowledge of the company an how its network works. They can pinpoint a specific vulnerability and may even have access to multiple parts of the network.

A

Insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rival companies, can bring down your network or steal information through espionage.

A

Competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internal/external

Inside the company, can be intentional, unintentional or act of god.

A

Internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Internal/external

Someone outside the company trying to get in

A

External

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Skill of the hacker and the complexity of the attack

A

Sophistication level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The amount of money and the value of the tech and gear being used

A

Resource
Funding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The reason for the attack and can be for political, monetary or social gains.

A

Intent
Motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data that is collected through publicly available information that can help make decisions and can be used by threat actors find targets and how to attack them. This is also incredibly helpful for mitigating risks and for identifying new threat actors

A

OSINT
Open-source intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly