Threat Actors and Vectors Flashcards

1
Q

The entity responsible for an event that has an impact on the safety of another entity. Also called a malicious actor.

A

Threat Actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attackers are in the network an undetected. It usually takes 71 days for a company to realized they are there in the U.S.

A

Advanced Persistent Threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Type of Threat Actor. Contractors or employees who work already inside the organization. Their attacks might not be as sophisticated. But they know things that a hacker doesn’t.

A

Insider Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It’s usually a government. They have the highest sophistication.

A

Nation State Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A hacker and an activist.

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Focused on running premade simple scripts to gain access in a network. They don’t have the knowledge or experience to gain that access.

A

Script Kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Set of professional criminals always motivated by financial gain.

A

Organized Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Refers to an expert with technology. Could be working for good or for malicious reasons.

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You perform your own IT functions without interacting with your IT department. This can lead to security risks, compliance issues, and wast of time and money.

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business competition that would love to see you out of the market so they perform DoS, espionage, or anything related to affect your business.

A

Competitors Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The method in which an attacker uses to gain access or infect the target.

A

Attack Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When an attacker has direct access to the hardware of a data center. Hence why companies lock down their data centers. I.e includes keyloggers.

A

Direct Access Attack Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Make sure the access point is secure. Not use default credentials for an attacker to access. Make sure is not designed to allow rogue access points.

A

Wireless Attack Vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The method that uses phishing, social engineering techniques, and ways to deliver malware by attaching to a message.

A

Email Attack Vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attackers can gather a lot of information such as location, family relationships, email, through this method. Very common method use for profiling.

A

Social Media attack vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

New wave of attack vectors through this newer technology. These applications are often publicly facing, and their configuration as well. They can have security misconfigurations, brute force attacks, or using DoS to increase load.

A

Cloud Based Attack Vectors

17
Q

Researching threats that can be dangerous to your organization. Example: OSINT, OWAST top 10.

A

Threat Intelligence

18
Q

Common source of threat intelligence. These compile information from researches that found a vulnerability and then report their research and publish it to share with others.

A

Vulnerability Databases

19
Q

Popular vulnerability database sponsored by the U.S. department of Homeland Security.

A

Common Vulnerabilities and Exposures database -CVE

20
Q

Where members upload information they have about a particular threat and is available to other members of the CTA and validate to the information. Way to react faster with higher quality of information.

A

Cyber Threat Intelligence - CTA

21
Q

Service the Cybersecurity and Infrastructure Security Agency (CISA) provides to enable real-time exchange of machine-readable cyber threat indicators and defensive measures between public and private-sector organizations.

A

Automated Indicator Sharing AIS

22
Q

A structured language for describing cyber threat information so it can be shared, stored, and analyzed in a consistent manner.

A

Structured Threat Information Expression (STIX™)

23
Q

the format through which threat intelligence data is transmitted.

A

Trusted Automated eXchange of Intelligence Information (TAXII)

24
Q

Clues and evidence of a data breach/intrusion.

A

Indicator of Compromise - IOC

25
Q

Analyzing large data quickly, identifying behaviors, DNS queries

A

Predictive Analysis

26
Q

Give a visual perspective of where attacks are originating and where are they going to.

A

Threat Maps

27
Q

group of individuals or organizations that collaborate to engage in illegal activities for profit or other illicit purposes.

A

Criminal Syndicate

28
Q
A