Topic 2A: Threat Actor types and vectors Flashcards
Vulnerability
A weakness
Threat
The possibility, intentionally or not, a vulnerability could be exploited
Risk
The likelihood and impact of a threat actor exploiting a vulnerability
External threat actor
Has no credentials within the system
Intent
What the actor wants resulting from the attack
Motivation
Actor’s reasoning for attempting an attack
Sophistication
The complexity with which an attack is perpetrated
What three types of actor have high levels of funding?
APT, State, Criminal Syndicate
Attack surface
The points at which a vulnerability could be exploited
Attack vector
A path to gain access to a secure system
Types of attack vectors
Direct access, removable media, email, remote & wireless, supply chain, web & social, cloud
Direct access
Physically using an endpoint or device
Removable media
Using a USB drive to execute a program or extract information
i.e. phishing
Remote & wireless
Attacker finds a network access point or spoofs an existing one