Topic 2A: Threat Actor types and vectors Flashcards

1
Q

Vulnerability

A

A weakness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat

A

The possibility, intentionally or not, a vulnerability could be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk

A

The likelihood and impact of a threat actor exploiting a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

External threat actor

A

Has no credentials within the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intent

A

What the actor wants resulting from the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Motivation

A

Actor’s reasoning for attempting an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sophistication

A

The complexity with which an attack is perpetrated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What three types of actor have high levels of funding?

A

APT, State, Criminal Syndicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack surface

A

The points at which a vulnerability could be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attack vector

A

A path to gain access to a secure system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of attack vectors

A

Direct access, removable media, email, remote & wireless, supply chain, web & social, cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Direct access

A

Physically using an endpoint or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Removable media

A

Using a USB drive to execute a program or extract information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Email

A

i.e. phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote & wireless

A

Attacker finds a network access point or spoofs an existing one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Supply chain

A

Targeting a weak link or vendor (Target and their HVAC provider)

17
Q

Web & Social

A

Compromising a website to conceal files or a malicious location

18
Q

Cloud

A

Finds compromises within an org’s cloud services