1.5 - Threat Actors and Vectors Flashcards

1
Q

Define a Threat Actor.

A

The entity responsible for an event that has an impact on the safety of another entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Advanced Persistent Threat (APT).

A

When an attacker has made there way onto a network without being detected. I can take several months to detect them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Insiders as a threat actor.

A

Individuals who have access to the network whether they are employees or contractors. Their attacks may not be as sophisticated, but they have insider knowledge and can focus down vulnerable systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Nation States as a threat actor.

A

Governments. They may try to damage other nations or organizations for their gain. They have massive resources and can do constant attacks. They are often an Advanced Persistent Threat (APT).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define a Hacktivist as a threat actor.

A

A hacker who has a social or political agenda. Funding is often limited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Script Kiddies as a threat actor.

A

Someone who runs pre-made scripts without any knowledge of what’s really happening. They can be internal or external. They often do not have funding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Organized Crime as a threat actor.

A

Professional criminals who are motivated by money to hack. They can often hire the best to do the hacking. The crime is often very organized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define a Hacker as a threat actor.

A

An individual who is an expert with technology. Hackers can be authorized to work within a network for the better. Some are malicious for personal gain. Some hackers might be semi-authorized. They might find vulnerabilities without any intention of using them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define a Shadow IT as a threat actor.

A

Individuals or a group within an organization that start acting as an IT unit in order to get around roadblocks that the IT unit might have set up to prevent security issues. They can be a good thing, but they are most often not because they can waste time and money, lead to security risks and compliance issues, and make the organization more dysfunctional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Competitors as a threat actor.

A

Other organizations competing with your organization. They could hack in an attempt to get an edge. They can steal customer lists, shut down competitors during an event, corrupt manufacturing databases, or take financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define an Attack Vector.

A

A method used by an attacker to gain access or infect the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Direct Access Attack Vectors.

A

An attacker physically attacks a system. They can plug in a key logger or modify an OS. They can do a DoS by just unplugging the PC or server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List some ways that an attacker could attack a Wireless network.

A

1) Default login Credentials
2) Rogue Access Point
3) Evil Twin
4) Wireless security protocol vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List some ways that an attacker could attack Email.

A

1) Phishing attacks
2) Deliver malware to user via message
3) Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List some ways that an attacker could attack a Supply Chain.

A

1) Tamper with the underlying infrastructure
2) Gain access to a network using a vendor
3) Malware can modify the manufacturing process
4) Counterfeit networking equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List some ways that an attacker could attack Social Media.

A

1) Personal information ( where you are and when)
Geolocation
2) User Profiling to get security answers to questions
3) Other people might be able to give information
about you

17
Q

List some ways that an attacker could attack using Removable media.

A

1) Get around the firewall (USB)
2) Malicious software on USB flash drives (air gap and
industrial networks)
3) USB devices can act as keyboards
4) Data exfiltration - Take Terabytes of data with no
bandwidth used

18
Q

List some ways that an attacker could attack the Cloud.

A

1) Publicly-facing application and services
2) Security misconfigurations
3) Brute force attacks or Phish users of the cloud
service
4) Orchestrations attacks
Make the cloud build new application instances
5) Denial of service
Disable the cloud services for everyone

19
Q

Define Threat Intelligence.

A

Researching threats through several resources. Decisions should be made based on the intelligence gathered.

20
Q

Define Open-source intelligence (OSINT).

A

Information on threats that is open-source. This can be found in social media or discussion groups, government data, and commercial data.

21
Q

Define Closed/proprietary intelligence.

A

Information on threats that is on sale. They may provide threat analytics, correlation across different data sources, or constant threat monitoring.

22
Q

Define Vulnerability databases.

A

Databases with data compiled from researchers who are trying to find vulnerabilities.

Ex.
1) Common Vulnerabilities and Exposure (CVE)
A community managed list of vulnerabilities
2) U.S. National Vulnerability Database (NVD)
A summary of CVEs
Provides additional details over the CVE list
including Patch availability and severity scoring

23
Q

Explain how different entities might share threat intelligence.

A

1) Public threat intelligence
Federal government might declassify information
2) Private threat intelligence
Private companies have extensive resources to
share
3) Cyber Threat Alliance (CTA)
Members upload specifically formatted threat int.
CTA scores each submission and validates across
other submissions
Other members can extract the validated data

24
Q

Define Automated indicator sharing (AIS).

A

A quick way to share threat intelligence. The standard way to share important threat data.

Structured Threat Information eXpression (STIX)
Describes cyber threat information
Includes motivations, abilities, capabilities, and
response information
Trusted Automated eXchange of Indicator Information (TAXII)
Securely shares STIX data

25
Q

Define dark web intelligence.

A

Information about threats gathered over the dark web. You can find hacking groups and services including: activities, tools and techniques, credit card sales, and accounts and passwords.

You can monitor forums for company and executive names.

26
Q

Define Indicators of Compromise (IOC).

A

An even that indicates an intrusion. The indicators can include an unusual amount of network activity, change to file hash values, irregular international traffic, changes to DNS data, uncommon login patterns, or spikes of read requests to certain files.

27
Q

Explain what predictive analysis includes.

A

1) Analyze large amounts of data very quickly
Find suspicious patterns
Big data used for cybersecurity
2) Identify behaviors
DNS queries, traffic patterns, and location data
3) Creates a forecast for potential for potential
attacks
4) Often combines machine learning

28
Q

What do threat maps do?

A

They identify attacks and trends through a worldwide perspective.

29
Q

What are some ways to use file/code repositories to gain intelligence?

A

1) See what the hackers are building
2) See what code is accidentally being released

30
Q

List some places you can research threats.

A

1) Vendor or manufacturer sites
2) CVE Data Feeds
3) National Vulnerability Database
4) Conferences
5) RFC
6) Local industry group
7) Social Media

31
Q

Define Tactics, techniques, and procedures (TTP).

A

A way of understanding the methods that attackers attempt to get on the network. Can include information on targeted victims, infrastructure used by attackers, or outbreak of a particular malware variant on a service type.

32
Q
A