1.5 Threat Actors, Vectors, Intelligence Sources Flashcards

1
Q

Actor:

  • Inside the organization
  • Low sophistication but high institutional knowledge
  • Extensive resources
A

Insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Actor

  • Governmental
  • High sophistication
  • Militaristic
  • APT
A

Nation States

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Actor:

  • Has a strong purpose for social change or agenda
  • Can be sophisticated
  • Limited funding
A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Actor:

  • Uses pre-made scripts without any technical knowledge
  • No sophistication or funding
  • Often do it for the fun of it
A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Actor:

  • High sophistication
  • Money motivated
  • Highly illegal activities
  • Highly organized
A

Organized Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Actor:

  • experts with technology
  • Can be authorized or unauthorized to perform activities
A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Actor:

  • Rogue team that circumvents IT department
  • Unencumbered and can make quick progress
  • Often leads to wasted time and money, security risks, and compliance issues
A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is used to describe the general pathways that an attacker can access a system or send an attack.

A

Attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vector:

  • When an attacker is able to access a system directly via hardware
A

Direct access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vector:

  • Often easily accessed by poor configuration such as default admin credentials or rogue access points
A

Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vector:

  • Most commonly exploited as it is the most successful
  • Usually involves phishing attacks
A

Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vector:

  • Compromise of vendor’s system which in turn creates a vulnerability for your organization
A

Supply Chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vector:

  • Vector commonly used to gather personal data to be used in other attacks
  • Uses web applications such as Facebook and Twitter
A

Social Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vector:

  • Physical level attack vector that involves USB drives, external hard drives, and CDs
A

Removable media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The process of researching threats and threat actors

A

threat intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This type of information is publicly available and provides a good foundational start. Includes intelligence from the internet, Gov’t agencies, and commercial data.

A

Open Source Intelligence (OSINT)

17
Q
  • This type of intelligence is generally compiled and owned by a private party
  • Can often be purchased
  • Can provide Constant threat monitoring
A

Closed/Proprietary Intel

18
Q
  • Community managed list of vulnerabilities
  • Sponsored by the US Dept. Homeland Security and Cybersecurity and Infrastructure Security Agency (CISA)
A

Common Vulnerabilities and Exposures (CVE)

19
Q

What is the US National Vulnerability Database and what does it provide over the CVE listings?

A

Summary of CVEs

Additional details such as patch availablity and severity scoring

20
Q

Information sharing centers provide a source of real-time, high quality cyber threat information. What is one example of an information sharing center?

A

Cyber Threat Alliance (CTA)

21
Q

This is the method used by the security community to standardize and share important threat data.

A

Automated indicator sharing (AIS)

22
Q

The “language” and syntax of AIS data that describes the cyber threat info and includes motivations, abilities, capabilities, and response info.

A

Structured Threat Information eXpression (STIX)

23
Q

The method used for securely sharing STIX data.

A

Trusted Automated eXchange of Indicator Information (TAXII)

24
Q

This source of intelligence is an overlay network that uses the internet but is not indexable by search engines. Houses a number of hacking groups and services.

A

Dark Web

25
Q

Events that indicate an intrution. These come with high confidence.

A

Indicator of Compromise (IOC)

26
Q

Name a few indicators of compromise on a network or system

A
  • Unusually high network traffic
  • Changes to file hash values
  • Irregular internation traffic
  • Changes to DNS traffic
  • Uncommon login patterns
  • Spikes in read requests of certain files
27
Q

This is a method for using big data in cybersecurity with the goal of identifying suspicious patterns and behaviours. Often combined with machine learning

A

Predictive analysis

28
Q

Used to identify attacks and trends from a worldwide perspective

Created from real attack data

A

Threat maps

29
Q

This resource allows you to see what hackers are building as well as developers who may accidentally release private code to early revealing vulnerabilities and flaws. Can includes sites such as Github.

A

File/code repositories

30
Q

This is the process of getting to know your enemy when it comes to cybersecurity

A

Threat research

31
Q

Where might you be able to find problems and vulnerabilities regarding a specific piece of software?

A

Vendor websites

32
Q

This threat resource is a form of automated vulnerability notification that may include the National Vulnerability Database (NVD), CVE datafeeds, or a number of third-party feeds.

A

Vulnerability feeds

33
Q

What are the benefits of attending conferences in terms of threat intelligence?

A
  • Meet researchers and learn new methods of intelligence gathering and new technologies
  • Get stories from the trenches
  • Forge alliances
34
Q

This intelligence resource provides cutting edge security anaylysis from academic professionals which often involves extremely detailed breakdowns of the information.

A

Academic journals

35
Q

This threat resource is generally a way to track and formalize a set of standards to be published on the internet for anyone to use.

A

Request for commends (RFC)

36
Q

This type of threat resource involves the gathering of local peers, particularly in the same industry as your own, who share a geographical presence

A

Local industry groups

37
Q

What you are looking for when performing threat research. Involves determing how the attackers are gaining access and what they are doing once they are in.

A

TTP (Tactics, Techniques, and procedures)

38
Q
A
39
Q
A