1.6 Flashcards

(43 cards)

1
Q

are typically state-sponsored attackers that are highly skilled and well-funded, and can carry out long-term attacks to achieve specific goals and remain undetected

A

APT Advanced persistent threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Employees, contractors, or partners who have access to an organization’s systems or information and intentionally or accidentally misuse or disclose it

A

Insider Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Government entities or military forces that use cyberattacks for political, military, or economic purposes

A

State Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Activists or groups that use hacking techniques to promote a social or political cause or to protest against organizations or governments

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Individuals with limited technical skills who use pre-existing tools or exploit code to launch simple attacks without understanding the underlying mechanisms

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Organized groups that conduct cyberattacks for financial gain, such as stealing sensitive information, ransomware attacks, or credit card fraud

A

Criminal Syndicates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Employees or contractors who are authorized to conduct penetration testing, vulnerability assessments, or other security testing on behalf of an organization

A

Authorized Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Individuals or groups who conduct cyberattacks without permission or authority to do so, with the intent to gain access to sensitive data or cause harm to a system or network

A

Unauthorized Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Individuals who have some level of permission to access a system or network, but use this access to carry out unauthorized actions or to gain access to sensitive data

A

Semi-Authorized Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The use of unauthorized or unapproved applications or hardware by employees, which can pose a security risk if they are not properly secured or managed

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business rivals or competitors who may use cyberattacks to gain a competitive advantage or to disrupt the operations of their competitors

A

Competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

internal vs external

A

Internal actors are members of the organization, while external actors are not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This refers to the actor’s knowledge and capabilities in carrying out a security breach.

A

Level of Sophistication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This refers to the actor’s access to financial resources, tools, and technology to facilitate a security breach.

A

Resources/Funding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This refers to the reason or goal behind the actor’s attempt to breach the system’s security.

A

Intent/Motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attackers gain access to a system physically by bypassing or breaking through physical security measures.

A

Direct Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attackers exploit vulnerabilities in wireless networks to gain unauthorized access to a system.

A

wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Attackers use phishing or other social engineering techniques to gain access to a system through email.

A

email vulnerabilioty

19
Q

Attackers exploit vulnerabilities in the supply chain to gain access to a system by targeting third-party vendors.

20
Q

Attackers use social media to gain access to a system through social engineering techniques or phishing attacks.

21
Q

Attackers gain access to a system by introducing malware or other malicious code via removable media such as USB drives or CDs.

A

removable media

22
Q

cloud vulnberabilities

A

Attackers exploit vulnerabilities in cloud-based systems to gain unauthorized access to sensitive data.

23
Q

Publicly available information gathered from sources such as news articles, social media, or other online resources.

24
Q

Intelligence sources that are available only to a specific organization or group and are not publicly available.

A

closed/propitery

25
Publicly available databases of known vulnerabilities in hardware, software, and applications that can be used to identify potential threats.
Vulnerability Databases
26
Organizations or groups that share information about threats and vulnerabilities among themselves and with trusted partners.
Public and Private Information Sharing Centers
27
Part of the internet that is not indexed by traditional search engines, and is often used for illegal activities, including the sale of stolen data and tools for hacking.
Dark Web
28
Specific pieces of data that are associated with a security breach or attack and can be used to identify the presence of a threat.
Indicators of Compromise (IOCs)
29
Automated systems for sharing IOCs among organizations and partners to facilitate faster detection and response to threats.
Automated Indicator Sharing (AIS)
30
A standard language for sharing threat intelligence that provides a consistent and structured format for organizing and exchanging threat information.
STIX (Structured Threat Information Expression)
31
A protocol for exchanging IOCs and other threat intelligence that enables automated sharing and integration with security systems.
TAXII (Trusted Automated Exchange of Indicator Information)
32
The use of historical data, statistical models, and machine learning algorithms to identify patterns and predict future security threats.
Predictive Analysis
33
Visual representations of real-time or historical data that illustrate the geography and scope of cyber threats, such as the location and frequency of attacks.
Threat Maps
34
Public or private repositories of code, software, or other files that may contain vulnerabilities or be used as tools for hacking.
File/Code Repositories
35
Websites of software, hardware, and other technology vendors that provide information about products and services, including security updates, patches, and vulnerability disclosures.
Vendor Websites
36
Feeds of information about newly discovered vulnerabilities in software, hardware, and other systems, which are often provided by vendors or other security researchers.
Vulnerability Feeds
37
Events where security researchers, vendors, and other experts share information about emerging threats, best practices, and new technologies related to information security.
Conferences
38
Peer-reviewed publications that provide in-depth research and analysis of topics related to information security, including trends, threats, and solutions.
Academic Journals
39
Technical documents published by the Internet Engineering Task Force (IETF) that provide guidelines, standards, and recommendations for internet protocols and other networking technologies.
Request for Comments (RFCs)
40
Organizations or groups of professionals who work in the same industry or geographic location, and who share information and collaborate on security-related issues.
Local Industry Groups
41
Platforms such as Twitter, LinkedIn, and other social networks that are used by security professionals to share news, updates, and insights about emerging threats and best practices.
Social Media
42
Real-time or near-real-time streams of information about threats, including indicators of compromise (IOCs) and other relevant data that can be used to identify and respond to potential threats.
Threat Feeds
43
Information about the methods, tools, and techniques used by threat actors to carry out attacks, including information on specific threat groups, their motivations, and their preferred attack vectors.
Adversary Tactics, Techniques, and Procedures