Threat Actors Flashcards

1
Q

Threat actor intent

A

Specific objective or goal that a threat actor is aiming to achieve through
their attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat actor motivation

A

Underlying reasons or driving forces that pushes a threat actor to carry
out their attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Possible threat actor motivations

A
  1. Data exfiltration
  2. Financial gain
  3. Blackmail
  4. Service disruption
  5. Philosophical or political beliefs (hacktivism)
  6. Ehtical reasons
  7. Revenge
  8. Disruption or chaos
  9. Espionage
  10. Cyber warfare
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internal threat actors

A

Individuals or entities within an organization who pose a threat to its
security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

External threat actors

A

Individuals or groups outside an organization who attempt to breach its
cybersecurity defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unskilled attackers

A

Individual who lacks the technical knowledge to develop their own hacking tools or exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hacktivists

A

Individuals or groups that use their technical skills to promote a cause or drive
social change instead of for personal gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Organized crime

A

Organized cybercrime groups are groups or syndicates that have banded together to
conduct criminal activities in the digital world
- Sophisticated and well structured
- Use resources and technical skills for illicit gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nation-state Actor

A

Groups or individuals that are sponsored by a government to conduct cyber
operations against other nations, organizations, or individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

APT

A

Advanced Persistent Threat
Often nation states or sponsored by nation states. Highly skilled and sophisticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Insider Threats

A

Cybersecurity threats that originate from within the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Shadow IT

A

Use of information technology systems, devices, software, applications, and
services without explicit organizational approval

IT-related projects that are managed outside of, and without the knowledge of,
the IT department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threat Vector

A

Means or pathway by which an attacker can gain unauthorized access to a
computer or network to deliver a malicious payload or carry out an unwanted
action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attack Surface

A

Encompasses all the various points where an unauthorized user can try to enter
data to or extract data from an environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TTPs

A

Tactics, Techniques and Procedures

Specific methods and patterns of activities or behaviors associated with a
particular threat actor or group of threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Honeypot

A

Decoy system or network set up to attract potential hackers

17
Q

Honeynet

A

Network of honeypots to create a more complex system that is designed
to mimic an entire network of systems

18
Q

Honeyfiles

A

Decoy file placed within a system to lure in potential attackers

19
Q

Honeytokens

A

Piece of data or a resource that has no legitimate value or use but is
monitored for access or use

20
Q

Port Triggering

A

Security mechanism where specific services or ports on a network
device remain closed until a specific outbound traffic pattern is
detected