Threat Actors Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a common motivation for threat actors related to stealing information?

A

Data Exfiltration

Data exfiltration refers to the unauthorized transfer of data from a computer or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which motivation for threat actors involves coercing individuals or organizations for money?

A

Blackmail

Blackmail typically involves threatening to reveal information unless a demand is met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of threat actor is motivated by political, social, or environmental ideologies?

A

Hacktivists

Hacktivists use cyberattacks to promote a political agenda or social change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two categories of threat actors based on their origin?

A

Internal vs. External Threat Actors

Internal threat actors originate from within an organization, while external threat actors come from outside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name a type of threat actor that executes cyberattacks for financial gain.

A

Organized Crime

Organized crime groups may engage in activities like ransomware and identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the term for IT systems and services managed without organizational approval?

A

Shadow IT

Shadow IT poses security risks as it may not comply with organizational policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of attacker is typically highly skilled and sponsored by a government?

A

Nation-state Actor

Nation-state actors engage in cyber espionage or warfare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: _______ are decoy systems used to attract and deceive attackers.

A

Honeypots

Honeypots are designed to lure attackers away from legitimate targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of honeytokens?

A

To alert administrators when accessed or used

Honeytokens are fake data that trigger alerts when interacted with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which threat vector involves the use of physical devices that can be easily removed?

A

Removable Devices

Examples include USB drives and external hard drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: Insider threats originate from external sources.

A

False

Insider threats come from individuals within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of technology consists of a network of decoy systems for observing complex attacks?

A

Honeynets

Honeynets are used for research and improving security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What distinguishes unskilled attackers from other types of threat actors?

A

Limited technical expertise

Unskilled attackers rely on readily available tools rather than advanced skills.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name a motivation for threat actors that involves causing chaos or disruption.

A

Disruption/Chaos

Some attackers aim to create disorder rather than achieve specific gains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three types of deception technologies mentioned?

A
  • Honeypots
  • Honeynets
  • Honeyfiles

Each serves a different purpose in deceiving attackers and gathering intelligence.

17
Q

Fill in the blank: _______ refers to security threats originating from within the organization.

A

Insider Threats

Insider threats can be intentional or unintentional actions that compromise security.