Understand attackers Flashcards

1
Q

List down different types of threat actors

A

Advanced persistent threats, insider threats, hacktivists,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are advanced persistent threats (APTs)?

A

Advanced persistent threats (APTs) have significant expertise accessing an organization’s network without authorization. APTs tend to research their targets (e.g., large corporations or government entities) in advance and can remain undetected for an extended period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What motivations and intentions can APTs have?

A

Damaging critical infrastructure, such as the power grid and natural resources, Gaining access to intellectual property, such as trade secrets or patents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are insider threats?

A

Insider threats abuse their authorized access to obtain data that may harm an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What motivations and intentions can insider threats hold?

A

Sabotage, Corruption, Espionage, Unauthorized data access or leaks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are hacktivists?

A

Hacktivists are threat actors that are driven by a political agenda. They abuse digital technology to accomplish their goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What goals may hacktivists hold

A

Demonstrations, Propaganda, Social change campaigns, Fame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a hacker?

A

A hacker is any person who uses computers to gain access to computer systems, networks, or data. They can be beginner or advanced technology professionals who use their skills for a variety of reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three main categories of hackers?

A

Authorized hackers (ethical hackers), semi-authorized hackers, and unauthorized hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are authorized hackers (ethical hackers) and what are they motivated to do?

A

They follow a code of ethics and adhere to the law to conduct organizational risk evaluations. They are motivated to safeguard people and organizations from malicious threat actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do semi-authorized hackers (researchers) do?

A

They search for vulnerabilities but don’t take advantage of the vulnerabilities they find.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do unauthorized hackers (unethical hackers) do and what are their goals?

A

They are malicious threat actors who do not follow or respect the law. Their goal is to collect and sell confidential data for financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what goals may new and unskilled threat actors have

A

To learn and enhance their hacking skills

To seek revenge

To exploit security weaknesses by using existing malware, programming scripts, and other tactics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what goals do more experienced hackers have?

A

Other types of hackers are not motivated by any particular agenda other than completing the job they were contracted to do. These types of hackers can be considered unethical or ethical hackers. They have been known to work on both illegal and legal tasks for pay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what goals may hackers that call themselves vigilantes face?

A

Their main goal is to protect the world from unethical hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly