Understanding Attackers Flashcards

1
Q

What is a SCRIPT KIDDIE?

A

Unskilled attackers that reuse hacking tools that have been developed by others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are good defenses against SCRIPT KIDDIES?

A

Basic security controls like regular patching, endpoint security software, firewalls, and intrusion prevention systems. This is due to the fact that the scripts used are usually for known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a HACKTIVIST?

A

Hackers who use their skills in order to advance their political or social agenda. The name comes from the combination of the words hacker and activist, and their skills can vary from script kiddie to an expert hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What types of attacks are primarily done by members of a criminal organization? What is the primary motive behind the attacks?

A

Ransomware and all types of cyber extortion. This is done mainly for financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is CORPORATE ESPIONAGE?

A

When a competitor of a competing business targets another business in order to obtain proprietary information that would give them a business advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an INSIDER THREAT?

A

An attack that comes from within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a PRIVILEGED ESCALATION ATTACK?

A

When a normal user’s credentials are modified into a type of super user account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some common characteristics of persons that take action of an INSIDER THREAT?

A

Tend to have a predisposition to perform the attack, such as disciplinary problems, mental illness, can be disgruntled from work, stress from personal lives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are behavioral indicators that the FBI suggests are indicative of an insider attack?

A

Taking work materials home, being interested in work issues that do not apply to them, bringing personal equipment to the office, buying items that they could not normally afford on a company salary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is THREAT INTELLIGENCE?

A

Set of activities that an organization undertake to educate itself about changes in the cybersecurity threat landscape, and integrate information about changing threats into its cybersecurity operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is OPEN-SOURCE INTELLIGENCE?

A

Gathering information from freely available public sources.
Examples: Security websites, general news media, social media, government-sponsored cybersecurity analysis centers, and security research organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is E-MAIL HARVESTING?

A

When attackers search the web for valid email addresses at the target’s domain and then use the addresses to send out spearfishing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly