Threat Actors and Vectors Flashcards
The entity responsible for an event that has an impact on the safety of another entity. Also called a malicious actor.
Threat Actor
Attackers are in the network an undetected. It usually takes 71 days for a company to realized they are there in the U.S.
Advanced Persistent Threat (APT)
Type of Threat Actor. Contractors or employees who work already inside the organization. Their attacks might not be as sophisticated. But they know things that a hacker doesn’t.
Insider Threat Actors
It’s usually a government. They have the highest sophistication.
Nation State Threat Actors
A hacker and an activist.
Hacktivist
Focused on running premade simple scripts to gain access in a network. They don’t have the knowledge or experience to gain that access.
Script Kiddie
Set of professional criminals always motivated by financial gain.
Organized Crime
Refers to an expert with technology. Could be working for good or for malicious reasons.
Hacker
You perform your own IT functions without interacting with your IT department. This can lead to security risks, compliance issues, and wast of time and money.
Shadow IT
Business competition that would love to see you out of the market so they perform DoS, espionage, or anything related to affect your business.
Competitors Threat Actors
The method in which an attacker uses to gain access or infect the target.
Attack Vector
When an attacker has direct access to the hardware of a data center. Hence why companies lock down their data centers. I.e includes keyloggers.
Direct Access Attack Vector
Make sure the access point is secure. Not use default credentials for an attacker to access. Make sure is not designed to allow rogue access points.
Wireless Attack Vectors
The method that uses phishing, social engineering techniques, and ways to deliver malware by attaching to a message.
Email Attack Vectors
Attackers can gather a lot of information such as location, family relationships, email, through this method. Very common method use for profiling.
Social Media attack vectors