Threat Actors Flashcards

1
Q

Which of the following is the term generally used to refer to the act of deliberately accessing computer systems and networks without authorization?

Threat

Vulnerability

Attack

A

Attack

Attack is the term that is now generally accepted when referring to the act of gaining unauthorized access to computer systems and networks. The terms phishing, threat, vulnerability all relate to attacks, but are not the act of attacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attacks by an individual or even a small group of attackers fall into which threat category?

APT

Singular threat

Hactivist

A

Hactivist

Attacks by an individual or even a small group of attackers fall into the hactivist threat category. Attacks by criminal organizations usually fall into the structured threat category. The other two answers are not categories of threats used by the security community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the term used to refer to individuals who do not have the technical expertise to develop scripts or discover new vulnerabilities in software but who have just enough understanding of computer systems to be able to download and run scripts that others have developed?

Script kiddies

Hackers

Simple intruders

A

Script kiddies

Script kiddies is the label used to refer to individuals who do not have the technical expertise to develop scripts or discover new vulnerabilities in software but who have just enough understanding of computer systems to be able to download and run scripts that others have developed. Hackers is the more general term used to refer to individuals at all levels who attempt to gain unauthorized access to computer systems and networks. The other two answers are not terms used in the security community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the name given to a group of hackers who work together for a collectivist effort, typically on behalf of some cause?

Script kiddies

Hacktivists

Motivated hackers

A

Hacktivists

When hackers work together for a collectivist effort, typically on behalf of some cause, they are referred to as hacktivists. Hacktivist groups may include script kiddies, but in general script kiddies do not have the skills to participate in a meaningful manner in advancing a hacktivist cause, although they may be enlisted as ground troops to add volume to an attack. The other two terms are not generally used in the security community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attacks by individuals from organized crime are generally considered to fall into which threat category?

Highly structure threats

Unstructured threat

Structured threat

A

Structured threat

Attacks by criminal organizations usually fall into the structured threat category characterized by a greater amount of planning, a longer period of time to conduct the activity, more financial backing to accomplish it, and possibly corruption of, or collusion with, insiders. Highly structured threats require greater planning, while unstructured threats require less, and APT attacks are typically nation state in origin, not organized criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the name given to the group of individuals who not only have the ability to write scripts that exploit vulnerabilities but also are capable of discovering new vulnerabilities?

Elite hackers

Hacktivists

Uber hackers

A

Elite hackers

Elite hackers is the name given to those who not only have the ability to write scripts that exploit vulnerabilities but also are capable of discovering new vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Criminal activity on the Internet can include which of the following? (Choose all that apply.)

Fraud

Extortion

Theft

Embezzlement

Forgery

A

Fraud

Extortion

Theft

Embezzlement

Forgery

Criminal activity on the Internet at its most basic is no different from criminal activity in the physical world. Fraud, extortion, theft, embezzlement, and forgery all take place in the electronic environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Warfare conducted against the information and information processing equipment used by an adversary is known as which of the following?

Information warfare

Cyber warfare

Offensive cyber operations

A

Information warfare

Information warfare is warfare conducted against the information and information processing equipment used by an adversary. Cyber warfare and offensive cyber operations are terms that you may encounter, but the more generally accepted term for this type of activity is information warfare. Computer espionage is generally associated with intelligence gathering and not general computer warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What term is used to describe the type of threat that is characterized by a much longer period of preparation (years is not uncommon), tremendous financial backing, and a large and organized group of attackers?

Advanced capability threat

Nation-state threat

Highly structured threat

A

Highly structured threat

A highly structured threat is characterized by a much longer period of preparation (years is not uncommon), tremendous financial backing, and a large and organized group of attackers. The threat may include attempts not only to subvert insiders but also to plant individuals inside of a potential target in advance of a planned attack. This type of threat generally is much more involved and extensive than a structured threat. The other terms are not commonly used in the security industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the term used to define attacks that are characterized by using toolkits to achieve a presence on a target network, with a focus on the long game—maintaining a persistence on the target network?

Advanced persistent threat

Covert channel attack

Concealed network presence

A

Concealed network presence

Advanced persistent threats (APTs) are attacks characterized by using toolkits to achieve a presence on a target network and then, instead of just moving to steal information, focusing on the long game, maintaining a persistence on the target network. Their tactics, tools, and procedures are focused on maintaining administrative access to the target network and avoiding detection. Covert channels are indeed a concern in security but are a special category of attack. The other terms are not generally used in the security community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are reasons that the insider threat is considered so dangerous? (Choose all that apply.)

Insiders have the access and knowledge necessary to cause immediate damage to an organization.

Insiders may actually already have all the access they need to perpetrate criminal activity such as fraud.

Insiders generally do not have knowledge of the security systems in place, so system monitoring will allow for any inappropriate activity to be detected.

Attacks by insiders are often the result of employees who have become disgruntled with their organization and are looking for ways to disrupt operations.

A

Insiders have the access and knowledge necessary to cause immediate damage to an organization.

Insiders may actually already have all the access they need to perpetrate criminal activity such as fraud.

Attacks by insiders are often the result of employees who have become disgruntled with their organization and are looking for ways to disrupt operations.

Insiders frequently do have knowledge of the security systems in place and are thus better able to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When discussing threat concerns regarding competitors, which of the following is true?

There are no known cases of criminal activity involving people moving from competitor to competitor, taking insider information with them for years.

Where in the past it would take significant risk to copy the detailed engineering specifications of a major process for a firm, today it can be accomplished with a few clicks and a USB drive.

Modern search engines make it less likely that a competitor could steal intellectual property without being detected.

A

Where in the past it would take significant risk to copy the detailed engineering specifications of a major process for a firm, today it can be accomplished with a few clicks and a USB drive.

In today’s world of global economic activity, much of it is enabled by the interconnected nature of businesses. Many businesses have an information component that is easier to copy, steal, or disrupt than older, more physical assets. Additionally, there have been cases of people moving from competitor to competitor, taking insider information with them for years, even decades, before the Internet was developed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following are true concerning attacker skill and sophistication? (Choose all that apply.)

The level of complexity for modern networks and operating systems has grown so that it is nearly impossible for anyone but the most skilled of hackers to gain unauthorized access to computer systems and networks.

Attackers do not have magic skills, but rather the persistence and skill to keep attacking weaknesses.

With the introduction of cloud computing during the last decade, attackers now primarily focus on the cloud, thus reducing the level of sophistication required to conduct attacks since they can focus on a more limited environment.

There is a surprising number of attacks being performed using old attacks, old vulnerabilities, and simple methods that take advantage of “low-hanging fruit.”

A

Attackers do not have magic skills, but rather the persistence and skill to keep attacking weaknesses.

There is a surprising number of attacks being performed using old attacks, old vulnerabilities, and simple methods that take advantage of “low-hanging fruit”

While the complexity of systems is indeed increasing, there still exists a large number of computers and networks that have not been adequately protected, making it possible for less sophisticated attackers to gain unauthorized access. Additionally, while cloud computing has added another focus for attackers, it has not eliminated computer systems and networks in general as potential targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is the term used to describe the processes used in the collection of information from public sources?

Media exploitation

Open source intelligence

Social media intelligence

A

Open source intelligence

Open source intelligence is the term used to describe the processes used in the collection of intelligence from public sources. Human intelligence (HUMINT) is a specific category of intelligence gathering focused on obtaining information directly from individuals. The other terms are not generally used by security professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What term is used to describe the gathering of information from a variety of sources, including non-public sources, to allow an entity to properly focus their defenses against the most likely threat actors?

Infosec analysis

Data intelligence

Threat intelligence

A

Threat intelligence

Threat intelligence is the gathering of information from a variety of sources, including non-public sources, to allow an entity to properly focus their defenses against the most likely threat actors. Information warfare is conducted against the information and information processing equipment used by an adversary and consists of a larger range of activities. The other two terms are not generally used by security professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly