Types of Bad Threat Actors Terms Flashcards

1
Q

Cybercriminal

A

A person who engages in criminal activity by means of computers or the internet.
-Cyber activity for criminal purposes.
-Mafia and gangs converted to this in recent years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Insider

A

A malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization’s security practices, data and computer systems.
-Own organizations employees, contractors, teammates.
-Biggest threat outside APT or bigger
-Doesn’t always mean intentional, but accidental or unintentional mistake, clicking on the link.
-Phishing, insider training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacktivist

A

The use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Script Kiddies

A

A relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures
-Unsophisticated in their hacking skill set and not a lot of code development, but free downloads vulnerabilities that are easy to take advantage of. Toolkits to download to hack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing

A

A type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim’s infrastructure like ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear Phishing

A

A targeted attack campaigns to gain access to an individual’s account or impersonate a specific individual , such as a ranking official or those involved in confidential operations within the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whaling

A

A highly targeted phishing attack - aimed at senior executives -
masquerading as a legitimate email. Whaling is digitally enabled fraud through social engineering, designed to encourage victims to perform a secondary action, such as initiating a wire transfer of funds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Botnets

A

A group of Internet-connected devices, each of which runs one or more bots.
Botnets can be used to perform Distributed Denial-of-Service
attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software.
-Application or automated app that is running to a certain thing.
-Multiple deployment amongst multiple places
-Security scorecard will report these things.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Man-in-the Middle

A

A form of eavesdropping where communication between two users is monitored and modified by an unauthorized party. Generally, the attacker actively eavesdrops by intercepting a public key message exchange and retransmits the message while replacing the requested key with his own.
-Eavesdropping
-Sitting between two communication points by listening to the data or altering the data in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Distributed Denial of Service

A

Distributed and/or Denial of Service: is a cyber-attack in which the
perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network
-The perp will flood the points so there’s so much data coming in that the network cannot handle it, flooded, the network just stops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Brute-force attack

A

Consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.
- After typing a password so many time it locks you out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware

A

A file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
And because malware comes in so many variants, there are numerous methods to infect computer systems.
-Infects, explores, or steals. Software that has a bad intent. Many forms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Worm

A

A standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers
-Standalone malware that replicates itself to spread to other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

A type of malware from cryptovirology that threatens to publish the victim’s personal data or permanently block access to it unless a ransom is paid. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion.

-Malware that encrypts someone’s system and until they pay the ransomware they cannot unlock.
-They get the ransom to unlock the data and the data is stolen so they pay the ransom so they won’t spread your data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Virus

A

A type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be “infected” with a computer virus, a metaphor derived from biological viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spyware/Adware

A

Software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privacy or endangering their device’s security.

17
Q

Trojan

A

Any malware that misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.

18
Q

PWN

A

Hacker jargon meaning to conquer or dominate. In the context of online security,
Pwned often means that your account or system has been
breached, and your passwords have been compromised.
The word originated in online gaming forums as a misspelling of “owned.”