701 - Section 2 Flashcards
What is the entity responsible for an event that has an impact on the safety of another entity called?
Threat actor or a malicious actor
What are the three attributes of threat actors?
Internal or external, resources or funding, level of sophistication or capability
Why is it important to find the motivation of a threat actor?
Because it identifies the purpose of the attack
Name five or more motivations for attackers?
Data exfiltration, espionage, service disruption, blackmail, financial gain, philosophical or political beliefs, ethical, revenge, disruption or chaos, war
Constant nation state attacks with massive resources are also known as
An advanced persistent threat
What are the location, resources, sophistication attributes of a nation state threat actor?
External, extensive, very high
What are the location, resources, sophistication attributes for an unskilled threat actor?
External, limited, very low
What are the location, resources, sophistication attributes for a Hacktivist threat actor?
External, some funding, can be high
What are the location, resources, sophistication attributes for an insider threat threat actor?
Internal, many resources, medium
What are the location, resources, sophistication attributes for an organized crime thread actor?
External, often extensive, very high
What are the location, resources, sophistication attributes for a shadow IT threat actor?
Internal, many resources, limited
What are the possible motivations for a nation state thread actor?
Data filtration, philosophical, revenge, disruption, war
What are the possible motivations for an unskilled threat actor?
Disruption, data, exfiltration, philosophical beliefs
What are the possible motivation for a Hacktivist thread actor?
Philosophical beliefs, revenge, disruption chaos
What are the possible motivations for an insider threat threat actor?
Revenge and financial gain
What are the possible motivations for an organized crime thread actor?
Financial
What are the possible motivations for shadow IT thread actor?
Philosophical beliefs and revenge
What is the method used by an attacker to gain access or to infect a target?
A threat vector or an attack vector
What are three types of message based attack vectors?
Fishing attacks for example, providing a link in an email or a text, delivering malware to a user for example and attachment within an email, social engineering attacks for example, invoice or cryptocurrency scams
What image format is known as a threat?
The scalable vector graphic format, SVG
What are two attack types of an image based attack?
HTML injection and JavaScript attack
What can defend against an image based attack?
A web browser providing input validation
What are three file based threat vectors?
Adobe PDF, zip or RAR files, Microsoft Office files
What are the four types of voice call attack vectors?
Vishing which is fishing over the phone spam over IP, war dialing, call tampering