Threat Vectors Flashcards
_____ refers to how an intruder connects to a network, often enabled by poor basic security practices by employees.
Access
_______ is used to described when an intruder creates a “foothold” in the network to allow a sustained presence.
Persistence
In ________, this is when an intruder achieves the final objective, whether it is to interfere, monitor, steal, or alter data, deceive, disable, or destroy.
Control
Utilizing any number of tricks to hide nefarious means.
Malicious Software
The price of being lazy or being restricted by a program office that does not release updates fast enough.
Unpatched Software/Improper Server Configuration
One of the most difficult threat vectors to defend against and even harder to detect when an adversary is using this vector.
Stolen, Legitimate Credentials
Manipulation of Layer 8 of the OSI Model (The User).
Social Engineering
One of the most serious threats to network security in the world today because of the dependency on email.
Phishing
This threat vector is a targeted attack accomplished by exploiting a website known to be visited by the actual target.
Watering Hole
When there are _______ _________ between domains, the authentication mechanism for each domain trusts the authentication mechanism for all other trusted domains.
Trust Relationships
_____ is a code injection attack used to target data-driven applications with nefarious code.
SQL
Scripts executed within user’s browser under the security context of the site they are visiting.
Cross-Site Scripting (XSS)
Any piece of information that objectively describes an intrusion.
Indicator of Compromise (IOC)