Threat Actors Flashcards

1
Q

Define a Threat Vector

A

The means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action. How an attack can be executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Attack Surface

A

The attack surface of a system or network is the sum of all the vulnerabilities and entry points that an attacker could exploit. Where an attack can be executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List of threat actors that can be used for an attack

A

Messages, images, files, voice calls, removable devices, and unsecured networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are deceptive and disruptive technologies?

A

Refers to a set of tools designed to mislead potential attackers, and hinder their malicious activities within a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name some deceptive and disruptive technologies

A

Honeypots, honeynets, honeyfiles, and honeytokens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Honeypots

A

A honeypot is a decoy (trap) system setup to lure (attract, persuade) cyber attackers, allowing defenders to study their actions without real-world consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define honeynet

A

Is an entire network of such deceptive systems that mimic a real-world environment to attract and analyze attacker’s behaviors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define honeyfile

A

A honeyfile is a decoy file that appears to be genuine data but it’s really just a watermarked file that can be used to detect unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define honeytoken

A

A honeytoken is a piece of information or a system entity that is created to serve as a decoy or alert mechanism. A honeytoken’s sole purpose is to be accessed or used illicitly, and any interaction with it is typically a clear sign of unauthorized activity, such as someone using a fake user account, a dummy email address, or a baited record in a database. It alerts the organization that someone has accessed the system. A honeytoken is a digital entity such as a fake password or user credential that when used triggers an alarm signaling a potential security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name some threat actor motivations

A

In cybersecurity, it is important to understand the motives behind different types of cyberattacks to help formulate an effective defense. Data exfiltration, blackmail, espionage, financial gain, revenge, war, service disruption, philosophical and political beliefs, ethical reasons, disruption, or chaos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name the attributes of a threat actor

A

Threat actors are classified based on their attributes. Their origin; internal or external. Resources and funding. Level of sophistication and capability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define ‘external actors’

A

Individuals or groups outside an organization who attempt to breach its cybersecurity defense. These external actors could be cybercriminals, hacktivists, competitors, or state-sponsored actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a primary motivation for a hacktivist threat actor?

A

Hacktivists are motivated by ideological, political, or philosophical beliefs and they use cybercrime as a means to promote a particular agenda or cause by seeking to bring attention to issues or to enact social change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which attribute of a threat actor indicates the amount of financial, technological, and human resources they can use for their operations?

A

Their resource level is an attribute that reflects the depth and breadth of resources (be it financial, technological, human, etc.) available to a threat actor for executing and supporting their malicious campaigns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following threat actors primarily operates based primarily on financial motivations and is considered to be highly structured and sophisticated in their attacks?

A

Organized cybercrime consists of groups that are primarily motivated by financial gain who are involved in various cybercriminal activities like data breaches, ransomware attacks, and financial fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of threat actor describes a disgruntled employee who may exploit their legitimate access for malicious purposes?

A

An insider threat refers to potential or actual threats that come from individuals within the organization, such as employees, contractors, or business associates, who have inside information concerning the organization’s security practices, data, and computer systems. They may exploit their legitimate access to cause harm due to malicious intent. Insider threats can also cause damage accidentally, but in this case, the employee is disgruntled, so the damage is malicious.