Threat Vectors (Threat Actors, Intelligence Sources, & Vulnerabilities) Flashcards
Threat Vectors
Direct Physical access (removable media)
Local network access
Remote access (VPN or no VPN)
Wireless, satelite, and cellular
Email, webmail, or messaging
Supply chain
Social Media
Personal or public cloud computing
Personal or public cloud computing
Protect those
access keys and other credentials at Amazon Web Services, IBM Cloud, Google Cloud Platform or Microsoft Azure.
Are you using single sign on? And if so, is that single sign on credential using a multifactor authentication, a physical or a software based token on your iPhone?
Social Media
How do you allow your organization to use social media and social networking. AUP
Supply chain
Security of your vendors and your strategic partners and your large customers are issues to consider
Email, webmail, or messaging
Monitoring access of your employees to peer to peer file sharing, cloud storage or Bit Torrents?
Wireless, satelite, and cellular
Are you using good wireless security? Are you protecting management frames? Are you avoiding automatic methods for associating with access points? Are you using Enterprise WPA3 as opposed to personal WPA2? Are you using satellite and cellular technologies?
Remote access (VPN or no VPN)
Do you use a VPN for your remote access or no VPN or is it situational
Local network access
Access to the network operating center, the security operations center, the data center, the server farm, closets, wiring closets, those things
Direct Physical access (removable media)
Access to infrastructure devices like switches or routers or firewalls or other appliances