Threat Actors Flashcards
What is Espionage?
- Spying on individuals, organizations, or nations to gather sensitive or classified information.
What is the popular term used to classify the lowest skilled threat actors?
Script kiddies
What method are script kiddies likely to adopt?
Pre-made software or scripts to exploit computer systems and networks.
What are hactivists?
Individuals or groups that use their technical skills to promote a cause or drive social change instead of for personal gain.
What is hacktivism?
Activities in which the use of hacking and other cyber techniques is used to promote or advance a political or social cause.
What is Website Defacement?
Form of electronic graffiti and is usually treated as an act of vandalism.
What is Doxing?
Involves the public release of private information about an individual or organisation.
What are organised cybercrime groups?
Sophisticated and well structured entities that leverage resources and technical skills for illicit gain.
What is a Nation-state Actor?
- Groups or individuals that are sponsored by a government to conduct cyber operations against other nations, organizations, or individuals.
What is a False Flag Attack?
- Attack that is orchestrated in such a way that it appears to originate from a different source or group than the actual perpetrators, with the intent to mislead investigators and attribute the attack to someone else.
What is Distributed Denial of Service (DDoS) Attacks?
Attempting to overwhelm the victim’s systems or networks so that they cannot be accessed by the organization’s legitimate users
Name 3 techniques used by nation-state actors?
■ Creating custom malware
■ Using zero-day exploits
■ Becoming an advanced persistent threats
What does ATP stand for?
Advanced Persistent Threat (APT)
What does the term ATP describe?
A prolonged and targeted cyberattack in which an intruder gains unauthorised access to a network and remains undetected for an extended period while trying to steal data or monitor network activities rather than cause immediate damage
To mitigate the risk of an insider threat being successful, organizations should implement the following
(4)
● Zero-trust architecture
● Employ robust access controls
● Conduct regular audits
● Provide effective employee security awareness programs