Threats Flashcards

1
Q

What is a threat actor?

A

An individual or group that poses a threat to an organization or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the attributes of a nation state threat actor?

A

Extensive resources and very high sophistication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the motivations of a nation state threat actor?

A

Data exfiltration, philosophical beliefs, revenge, disruption, and war.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the attributes of an unskilled external threat actor?

A

Limited resources and very low sophistication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the motivations of an unskilled external threat actor?

A

Disruption and data exfiltration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the attributes of a hacktivist?

A

Some funding and can be high sophistication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the motivations of a hacktivist?

A

Philosophical beliefs, revenge, and disruption/chaos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the attributes of an insider threat?

A

Many resources and medium sophistication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the motivations of an insider threat?

A

Revenge and financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the attributes of organized crime as a threat actor?

A

Often extensive resources and very high sophistication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the motivation of organized crime?

A

Financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the attributes of shadow IT?

A

Many resources and limited sophistication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the motivations of shadow IT?

A

Philosophical beliefs and revenge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are threat vectors?

A

Methods used by attackers to exploit vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are message-based vectors?

A

Methods such as phishing attacks and social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a common method of phishing?

A

People clicking links in emails or texts.

17
Q

What is an image-based vector?

A

Threats hidden within image files, such as SVG format.

18
Q

What are significant security concerns with image-based vectors?

A

HTML injection and Javascript attack code.

19
Q

What are file-based vectors?

A

Malicious code hidden in various file formats like PDFs and ZIP files.

20
Q

What is vishing?

A

Phishing attacks conducted over the phone.

21
Q

What are removable device vectors?

A

Malicious software on USB drives that can infect networks.

22
Q

What is a potential risk of USB devices?

A

They can act as keyboards, allowing for data exfiltration.