1.5 Explain different threat actors, vectors, and intelligence sources Flashcards

1
Q

Threat Actor

A

The bad guy, the person or entity that is trying to hack you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack Vector

A

The method of hacking, how the threat actor hacks you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

APT

A

Advanced Persistent Threat, attackers in the network and stay there until taken out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Insiders Threats

A

Threat Actor that has access to your organization data because they work there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

State Actors

A

A threat actor that works for a government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hacktivist

A

a hacker with a purpose, a hacker that’s a activist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Script kiddies

A

threat actor that runs many scripts in hope that they gain access, not experienced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Criminal Syndicates

A

Professional criminals that have the resources to hack. motivated by money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hackers

A

people that are experts in technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authorized Hacker

A

ethical hacker with good intentions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unauthorized Hacker

A

hackers with malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Semi-authorized

A

Hackers that find vulnerabilities but don’t exploit it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Shadow IT

A

Organization that create there own IT functions. Causes security Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Competitors

A

Threat Actor that tries to cause a DoS to your company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Direct access Vector

A

Attacks vector that has direct access to your OS. Attaches keylogger to collect info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Email Vector

A

Threat Actor phishing, or deliver malware through email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Supply Chain Vector

A

Tampering with the manufacturing process

18
Q

Social Media Vector

A

Threat Actor that use your social media to gain information

19
Q

Removable Media Vector

A

Malicious USB, or uses USB to steal information

20
Q

Cloud Vector

A

Attacks the Cloud by exploiting misconfig., brute force, and cause a DoS.

21
Q

OSINT

A

Open Source Int
public info on cyber security from internet, gov data, social media, commercial

21
Q

Wireless Vector

A

Vectors that allow a threat Actor access to your network.
default login cred., Rouge Access point, Evil twin, weak encryption

22
Q

Closed/Proprietary

A

Threat Int. source that you pay for and is formatted to be understood easily

23
Q

Vulnerability Database

A

CVE and NVD are vulnerability data bases that researchers have found and published.

NVD provides scoring and tells solutions

24
Q

Public/private Info-Sharing Centers

A

Public-federal gov. releases unclassified cyber attack info
Private- Real time cyber info shared

25
Q

AIS

A

Automated Indicator Sharing
automictic way sharing threat information

26
Q

STIX

A

Structured Threat Information eXpression
Standardize way of detailing a cyber threat

27
Q

TAXII

A

Transportation method for STIX data between orgainzations

28
Q

Dark Web Intelligence

A

Hacking Groups and services that provides you with a “how to” and sells info for you to hack

29
Q

Predictive Analysis

A

Finding suspicious behaviors such as: DNS queries, traffic patterns, and location data.

30
Q

Threat Maps

A

A view of where threats are coming form

31
Q

File/code Repositories

A

Public code that has been released, attackers get check repositories to see if source code was released

32
Q

Vendor Websites

A

First one to know if their product was compromised

33
Q

Vulnerability Feeds

A

Combines vulnerability databases and creates a central vul. feed.

34
Q

Conference

A

Collected source of info. form people that researched, identified, experienced attacks.

35
Q

Academic Journals

A

Detailed information on how someone delt with a attack

36
Q

RFC

A

Track and create a set of standards everyone can use.
also provide details of a threats and vulnerability

37
Q

Local Industry Groups

A

Gathering of local peers to share info.

38
Q

Social Media

A

Hacking groups that discuss vulnerabilities

39
Q

Threat Feeds

A

Automated feed that alerts you of a threat

40
Q

TTP

A

(Tactics, Technique, and procedure)
How Threat Actors are hacking and how are they doing it.