Threat Actors Flashcards
Data Exfilitration
the unauthorized transfer of data from a computer
Financial Gain
the most common motivation
Blackmail
sensitive or compromising information held and threatened for release
Service Disruption
DDOS attack to overwhelm a network with excessive ammount of traffic
Threat Actor Motivation Types
Philosophical, Ethical Reasons, Revenge, Disruption, Espionage, War
Internal Threat Actors
entities within an org who pose a threat to security
Extenal Threat Actors
entities outside an org that poses a threat
Threat Actors Resource/Funding
the tools, skills, personell at the disposal of a threat actor
Threat Actors Level of Complexity
how big brain the threat actors are
Threat Actor Unskilled Attacker
an individual who lacks the technical knowledge
Threat Actor Hacktivists
individuals or groups who use their technical skills to promote a social change
Threat Actor Organized Cyber Crime
sophisticated and well-structered entites that leverage resources and technical skills for gain
Threat Actor Nation State Actors
groups that are sponsered by the government to conduct cyber operations
False Flag Attack
an attack orchestrated to appear it originated from a different source
Advance Persistent Threat
if a nation-state actor exists under long-term and stealth
Stuxnet Worm
piece of malware designed to sabotage the iranian government’s nuclear program
Insider Threats
threats that originate from within the org
Insider Threat Types
Data Theft, Sabotage, & Misuse of Access privledges
Shadow IT
the use of information systems, devices, software, and apps without explicity approval
Threat Vectors
the means or pathway an attacker uses to gain access THE HOW
Attack Surface
the various points where an actor can use to enter or extract data THE WHERE
Threat Vector Types
Messages, Images, Files, Voice Calls, Removable Devices, and Unsecure Networks
BlueBorne
vulnerabilities in bluetooth technology that can allow a hacker to take control
Threat Actor Prevention Tactics-Techniques-Procedures
specific methods and patterns of activites of a threat actor