Threat Models Pt. 1 (Diamond Model) Flashcards

1
Q

What are the four vertices of the diamond model?

A
  1. Adversary
  2. Victim
  3. Capability
  4. Infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An ________ is the actor/organization responsible for utilizing a capability against the victim to achieve their intent.

A

Adversary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is the actual “hacker” or person(s) conducting the intrusion activity.

A

Adversary Operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This entity stands to benefit from the activity conducted in the intrusion.

A

Adversary Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ______ is the target of the adversary and against whom vulnerabilities and exposures are exploited.

A

Victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_________ _______ are the people and organizations being targeted and whose assets are being exploited and attacked.

A

Victim Personae

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ ____ are the attack surface and consist of the set of networks, systems, hosts, email addresses, IPs, social networking accounts, etc. which the adversary directs their capabilities.

A

Victim Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describes the tools/techniques used by the adversary, it can be as simple as a “manual password guessing” or as sophisticated “SHA256 hash of executable”.

A

Capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

All the vulnerabilities and exposures utilized by the individual capability regardless of victim are considered its capacity.

A

Capability Capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An adversary’s complete set of capabilities.

A

Adversary Arsenal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ______ feature describes the physical and/or logical communication structures the adversary uses to deliver a capability maintain control of capabilities, and effect results from the victim.

A

Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Infrastructure which is fully controlled or owned by the adversary or which they may be in physical proximity.

A

Type 1 Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Infrastructure which is controlled by an intermediary.

A

Type 2 Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ is the analytic technique of extracting a data element and exploiting that element, in conjunction with data sources, to discover other related elements.

A

Pivoting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly