Threat Actors Flashcards

1
Q

Data Exfilitration

A

the unauthorized transfer of data from a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Financial Gain

A

the most common motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Blackmail

A

sensitive or compromising information held and threatened for release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Service Disruption

A

DDOS attack to overwhelm a network with excessive ammount of traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat Actor Motivation Types

A

Philosophical, Ethical Reasons, Revenge, Disruption, Espionage, War

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internal Threat Actors

A

entities within an org who pose a threat to security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Extenal Threat Actors

A

entities outside an org that poses a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat Actors Resource/Funding

A

the tools, skills, personell at the disposal of a threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat Actors Level of Complexity

A

how big brain the threat actors are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat Actor Unskilled Attacker

A

an individual who lacks the technical knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat Actor Hacktivists

A

individuals or groups who use their technical skills to promote a social change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat Actor Organized Cyber Crime

A

sophisticated and well-structered entites that leverage resources and technical skills for gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threat Actor Nation State Actors

A

groups that are sponsered by the government to conduct cyber operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

False Flag Attack

A

an attack orchestrated to appear it originated from a different source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Advance Persistent Threat

A

if a nation-state actor exists under long-term and stealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stuxnet Worm

A

piece of malware designed to sabotage the iranian government’s nuclear program

17
Q

Insider Threats

A

threats that originate from within the org

18
Q

Insider Threat Types

A

Data Theft, Sabotage, & Misuse of Access privledges

19
Q

Shadow IT

A

the use of information systems, devices, software, and apps without explicity approval

20
Q

Threat Vectors

A

the means or pathway an attacker uses to gain access THE HOW

21
Q

Attack Surface

A

the various points where an actor can use to enter or extract data THE WHERE

22
Q

Threat Vector Types

A

Messages, Images, Files, Voice Calls, Removable Devices, and Unsecure Networks

23
Q

BlueBorne

A

vulnerabilities in bluetooth technology that can allow a hacker to take control

24
Q

Threat Actor Prevention Tactics-Techniques-Procedures

A

specific methods and patterns of activites of a threat actor