threat agents Flashcards
Internal Threat
disgruntled employees both current and former of all types and customers who seek to retain organization information threw means of exploiting their inherent privileges for either revenge or monetary gain
external threat
individual or groups that attack from outside and seek to gain unauthorized access to data .
persistent threat
try to gain access while at the same time staying unnoticed
they also go to great lengths to make sure they are not found in the network
Non persistent threat
only concerned with gaining access to the system and stealing information
attack is usually one time event and attacker does not care if noticed
open source inteligence (OSINIT)
threat actor seeks open-source information to gain information about an organization. this information is open source and does not require hacking into the organization system
open source intelligence include the following?
media
internet
public government
list of insider
employee janitor security guards former employees customers
reasons an insider would betray an organization
disgruntled with employer
bribed by competitor company
seeking personal financial gain
insider
a person who can do serious damage to an organization. insiders are one of the most over looked people in an organization
how to protect against insider?
require mandatory vacations
create and follow onboard and
off-board procedures
employ the principal of least privilege
have appropriate physical security control in places
require security training tailored to the role of the employee
unintentional insider threat actor
a employee who accidentally destroys data
script kiddie
individual that uses programs made by more advanced hackers to carry out an attack.
typically lack the knowledge to create there own program
motivated by impressing friends and getting attention in hacking community
because of lack of knowledge they usually exploit well known vulnerabilities in systems
how to protect against script kiddie?
keep systems up to date and use standard security practices
hacktivists
politicaly motivated attacks
dont seek financial gain but to expose, defame and shed light on organizations and governments
usually work alone
organized crime
group of cyber criminals–> main aim financial gain
attacks carried out by organized crime groups last months, are very well funded and extremely sophisticated
once access gained group steals data, threaten to release data or use ransomware to hold data hostage
extremely hard to protect against due to sophistication and large amount of funding