2A: Explain Threat Actor Types and Attack Vectors Flashcards

1
Q

Which of the following would be assessed by likelihood and impact: vulnerability, threat, or risk?

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or false? Nation-state actors primarily only pose a risk to another state’s government?

A

False—nation state actors have targeted commercial interests for theft, espionage, and extortion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You receive an email with a screenshot showing a command prompt at one of your application servers. The email suggests you engage the hacker for a day’s consultancy to patch the vulnerability. How should you categorize this threat?

A

This is either gray hat (semi-authorized) hacking or black hat (non-authorized) hacking. If the request for compensation via consultancy is an extortion threat (if refused, the hacker sells the exploit on the dark web), then the motivation is purely financial gain and can be categorized as black hat. If the consultancy is refused and the hacker takes no further action, it can be classed as gray hat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of threat actor is primarily motivated by the desire for social change?

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which three types of threat actor are most likely to have high levels of funding?

A

State actors, criminal syndicates, and competitors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are assisting with writing an attack surface assessment report for a small company. Review the headings below and determine which two potential attack vectors have been omitted:
Direct access, Email, Remote and wireless, Web and social media, Cloud.

A

Removable media and supply chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is APT

A

advanced persistent threat

An attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an attack surface

A

ALL the points at which a network or application receives external connections or inputs/outputs that are potential vectors to be exploited by a threat actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an attack vector?

A

A specific path by which a threat actor gains unauthorized access to a system. Also referred to as a vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a black hat?

A

A hacker operating with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are criminal syndicates

A

A type of threat actor that uses hacking and computer fraud for commercial gain. Also referred to as organized crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a gray hat?

A

A hacker who analyzes networks without seeking authorization, but without overtly malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a hacker?

A

Often used to refer to someone who breaks into computer systems or spreads viruses

Ethical Hackers prefer to think of themselves as experts on and explorers of computer security systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a hacktivist?

A

A threat actor that is motivated by a social issue or political cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an insider threat?

A

A threat actor who has assigned privileges on the system that cause an intentional or unintentional incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an intentional threat?

A

threat actor with malicious purpose

17
Q

What is a script kiddie?

A

An inexperienced, unskilled attacker that typically uses tools or scripts created by others.

18
Q

What is shadow IT?

A

Computer hardware, software, or services used on a private network without authorization from the system owner.

19
Q

What is a state actor?

A

A type of threat actor that is supported by the resources of its host country’s military and security services. Also referred to as a nation state actor.

20
Q

what is a supply chain attack?

A

An attack that targets the end-to-end process of manufacturing, distributing, and handling goods and services.

21
Q

what is a threat?

A

The potential for an entity to exploit a vulnerability/to breach security

22
Q

what is a threat actor?

A

The person or entity responsible for an event that has been identified as a security incident or as a risk.

23
Q

what is an unintentional threat?

A

A threat actor that causes a vulnerability or exposes an attack vector without malicious intent.

24
Q

what is a vulnerability?

A

A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

`

25
Q

What is risk?

A

is the likelihood and impact (or consequence) of a threat actor exploiting a vulnerability

26
Q

what is a white hat?

A

A hacker engaged in authorized penetration testing or other security consultancy.

27
Q

what is an external threat?

A

one that has no account or authorized access to the target system

28
Q

what is capability?

A

a threat actor’s ability to craft novel exploit techniques and tools

29
Q

what is the difference in intent and motive>

A

Intent = goal of the attack (vandalize, disrupt, steal info)
motive = reason for attack (greed, curiosity, grievance)

30
Q

Name examples of hacktivists

A

Anonymous, Wikileaks, LulzSec

31
Q

Name some attack vectors

A

Direct Access
Removable Media
Email
Remote / wireless
supply chain
web and social media
clous