threat agents Flashcards

1
Q

Internal Threat

A

disgruntled employees both current and former of all types and customers who seek to retain organization information threw means of exploiting their inherent privileges for either revenge or monetary gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

external threat

A

individual or groups that attack from outside and seek to gain unauthorized access to data .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

persistent threat

A

try to gain access while at the same time staying unnoticed

they also go to great lengths to make sure they are not found in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Non persistent threat

A

only concerned with gaining access to the system and stealing information
attack is usually one time event and attacker does not care if noticed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

open source inteligence (OSINIT)

A

threat actor seeks open-source information to gain information about an organization. this information is open source and does not require hacking into the organization system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

open source intelligence include the following?

A

media
internet
public government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

list of insider

A
employee 
janitor 
security guards
former employees 
customers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

reasons an insider would betray an organization

A

disgruntled with employer

bribed by competitor company

seeking personal financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

insider

A

a person who can do serious damage to an organization. insiders are one of the most over looked people in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how to protect against insider?

A

require mandatory vacations

create and follow onboard and
off-board procedures

employ the principal of least privilege

have appropriate physical security control in places

require security training tailored to the role of the employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

unintentional insider threat actor

A

a employee who accidentally destroys data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

script kiddie

A

individual that uses programs made by more advanced hackers to carry out an attack.

typically lack the knowledge to create there own program

motivated by impressing friends and getting attention in hacking community

because of lack of knowledge they usually exploit well known vulnerabilities in systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how to protect against script kiddie?

A

keep systems up to date and use standard security practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

hacktivists

A

politicaly motivated attacks

dont seek financial gain but to expose, defame and shed light on organizations and governments

usually work alone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

organized crime

A

group of cyber criminals–> main aim financial gain

attacks carried out by organized crime groups last months, are very well funded and extremely sophisticated

once access gained group steals data, threaten to release data or use ransomware to hold data hostage

extremely hard to protect against due to sophistication and large amount of funding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how to protect against organized crime

A

proper user security training

implementing email filtering systems

proper securing and storing of data

17
Q

nation state

A

most organized, well funded and most dangerous type of threat actor

two primary motives:
obtaining information like
sensitive information such as government information

usually target government contracts or governments them selves
these attacks are considered atp because they rely on being undetected

18
Q

competitor

A

competitor threat actor is paid to carry out attacks on behalf of an organization and target competing companies