1.5 Explain different threat actors, vectors, and intelligence sources Flashcards

(38 cards)

1
Q

Actors and threats
-Advance persistent threat (APT)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Actors and threats
-Insider threats

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Actors and threats
-State actors

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Actors and threats
-Hacktivists

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Actors and threats
-Script kiddies

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Actors and threats
-Criminal syndicates

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Actors and threats
-Hackers authorized/unauthorized/semi-authorized

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Actors and threats
-Shadow IT

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Actors and threats
-Competitors

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attributes of actors
-Internal/external

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attributes of actors
-Level of sophistication/capability

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attributes of actors
-Resources/funding

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attributes of actors
-Intent/motivation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vectors
-Direct Access

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vectors
-Wireless

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vectors
-Email

17
Q

Vectors
-Supply chain

18
Q

Vectors
-Social Media

19
Q

Vectors
-Removable media

20
Q

Vectors
-Cloud

21
Q

Threat intelligence sources
-OSINT

22
Q

Threat intelligence sources
-Closed/proprietary

23
Q

Threat intelligence sources
-Vulnerability databases

24
Q

Threat intelligence sources
-Public/private information-sharing centers

25
Threat intelligence sources -Dark web
26
Threat intelligence sources -Indicators of compromise
27
Threat intelligence sources -Automated Indicator Sharing (AIS)/Structured Thread Information eXpression (STIX/Trusted Automated eXchange of Intelligence Information (TAXII)
28
Threat intelligence sources -Predicitve analysis
29
Threat intelligence sources -Threat maps
30
Threat intelligence sources -File/code repositories
31
Research sources -Vendor websites
32
Research sources -Vulnerability feeds
33
Research sources -Conferences
34
Research sources -Academic journals
35
Research sources -Request for comments (RFC)
36
Research sources -Local industry groups
37
Research sources -Socail media
38
Research sources -Threat feeds