Threat actors, Phishing, Watering hole attacks, Social engineering Flashcards
Threat actors
Someone that seeks to undermine or breach data security and systems
Motivations of threat actors include:
-Data exfiltration
-Espionage
-Financial gain
-Ethical
-Blackmail
-War
-Philosophical
Nation state
Unskilled workers
-Motive is to prove their skills.
-Limited skills, little knowledge.
-Rely on automated tools.
Hacktivist
- Look to accomplish some activist goal
-Lacks hierarchical structure.
-Skill level varies.
Insider threat
○ Someone who has authorized access to info & systems, uses access to wage an attack against organization.
○ Works alone, limited resources & time.
Organized crime
Motive is illegal financial gain.
Tend to have more resources.
Shadow IT
Individuals or groups seek out own technology solutions not approved by organization
Threat vectors
method that cyber criminals use to gain unauthorized access.
Threat actors are able to obtain access via-
-Message, image, file, voice-call, removable device vulnerable software, unsecured network, open ports, tampered supply chain.
Open service ports can be mitigated through-
Port scanning
Patch management
Firewall configuration
Least privilege principle
Supply chain vectors can be mitigated through-
Regular security assessments
Incident response planning
Phishing
Attacker impersonates via email in hopes to trick people in revealing sensitive info.
Business email compromise
criminals send an email message that appears to come from a known source making a legitimate request.
Typo squatting
type of URL hijacking