Threat actors, Phishing, Watering hole attacks, Social engineering Flashcards

1
Q

Threat actors

A

Someone that seeks to undermine or breach data security and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Motivations of threat actors include:

A

-Data exfiltration
-Espionage
-Financial gain
-Ethical
-Blackmail
-War
-Philosophical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Nation state

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unskilled workers

A

-Motive is to prove their skills.
-Limited skills, little knowledge.
-Rely on automated tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hacktivist

A
  • Look to accomplish some activist goal
    -Lacks hierarchical structure.
    -Skill level varies.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Insider threat

A

○ Someone who has authorized access to info & systems, uses access to wage an attack against organization.
○ Works alone, limited resources & time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Organized crime

A

Motive is illegal financial gain.
Tend to have more resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shadow IT

A

Individuals or groups seek out own technology solutions not approved by organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat vectors

A

method that cyber criminals use to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat actors are able to obtain access via-

A

-Message, image, file, voice-call, removable device vulnerable software, unsecured network, open ports, tampered supply chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Open service ports can be mitigated through-

A

Port scanning
Patch management
Firewall configuration
Least privilege principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Supply chain vectors can be mitigated through-

A

Regular security assessments
Incident response planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing

A

Attacker impersonates via email in hopes to trick people in revealing sensitive info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Business email compromise

A

criminals send an email message that appears to come from a known source making a legitimate request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Typo squatting

A

type of URL hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pretexting

A

Lying to get info (pretending to be a credible source)

17
Q

Watering hole attack

A

Attacker seeks to compromise a specific group of end users by infecting websites they commonly visit.

18
Q

Influence campaigns

A

Look to sway public opinions on political/social issues

19
Q

Brand impersonation

A

Pretends to be a well known brand, creates thousands of impersonated sites.

20
Q

=

A