Threat Actors Flashcards
What is a common motivation for threat actors related to stealing information?
Data Exfiltration
Data exfiltration refers to the unauthorized transfer of data from a computer or network.
Which motivation for threat actors involves coercing individuals or organizations for money?
Blackmail
Blackmail typically involves threatening to reveal information unless a demand is met.
What type of threat actor is motivated by political, social, or environmental ideologies?
Hacktivists
Hacktivists use cyberattacks to promote a political agenda or social change.
What are the two categories of threat actors based on their origin?
Internal vs. External Threat Actors
Internal threat actors originate from within an organization, while external threat actors come from outside.
Name a type of threat actor that executes cyberattacks for financial gain.
Organized Crime
Organized crime groups may engage in activities like ransomware and identity theft.
What is the term for IT systems and services managed without organizational approval?
Shadow IT
Shadow IT poses security risks as it may not comply with organizational policies.
What type of attacker is typically highly skilled and sponsored by a government?
Nation-state Actor
Nation-state actors engage in cyber espionage or warfare.
Fill in the blank: _______ are decoy systems used to attract and deceive attackers.
Honeypots
Honeypots are designed to lure attackers away from legitimate targets.
What is the purpose of honeytokens?
To alert administrators when accessed or used
Honeytokens are fake data that trigger alerts when interacted with.
Which threat vector involves the use of physical devices that can be easily removed?
Removable Devices
Examples include USB drives and external hard drives.
True or False: Insider threats originate from external sources.
False
Insider threats come from individuals within the organization.
What type of technology consists of a network of decoy systems for observing complex attacks?
Honeynets
Honeynets are used for research and improving security measures.
What distinguishes unskilled attackers from other types of threat actors?
Limited technical expertise
Unskilled attackers rely on readily available tools rather than advanced skills.
Name a motivation for threat actors that involves causing chaos or disruption.
Disruption/Chaos
Some attackers aim to create disorder rather than achieve specific gains.
What are the three types of deception technologies mentioned?
- Honeypots
- Honeynets
- Honeyfiles
Each serves a different purpose in deceiving attackers and gathering intelligence.
Fill in the blank: _______ refers to security threats originating from within the organization.
Insider Threats
Insider threats can be intentional or unintentional actions that compromise security.