Chapter 1: Key Terms Flashcards
(33 cards)
Threat Actor
The individual or entity that is responsible `for attacks against the technology of enterprises and users.
Attributes
Characteristic features of the different groups of threat actors.
Intent/Motivation
Reasons for an attack by threat actors.
Hacker
A person who uses advanced computer skills to attack computers.
Black hat hackers
Threat actors who violate computer security for personal gain or to inflict malicious damage.
White hat hackers
Hackers that probe a system with an organization’s permission to find weaknesses and report them to the organization.
Gray hat hackers
Hackers that probe a system without an organization’s permission to expose flaws the system and get the company to take action.
Script Kiddies
Individuals who want to perform attacks yet lack the technical knowledge to carry them out.
Hacktivists
A group of attackers that is strongly motivated by ideology.
State Actors
Government-sponsored attackers who launch cyberattacks against the foes of the state.
Advanced Persistent Threat (APT)
An attack that uses advanced methods to infect and silently extract data over an extended period of time.
Insider Threat
Trusted employees that attack an organization from the inside.
Competitors
Attackers who launch attacks against an opponent’s system to steal classified information.
Criminal Syndicates
Attackers that contract out their services to aid in criminal activity.
Shadow IT
Employees that install their own equipment or software that violates company policy and exposes the company to attacks.
Brokers
Attackers that sell their knowledge of a weakness to other attackers or governments.
Cyberterrorists
Attackers that attack a nation’s network to cause disruption and panic among citizens.
Legacy Platform
An older platform that no longer widespread.
On-premises Platform
A platform that remains within the physical confines of an enterprise.
Cloud Platform
A pay-per-use computing model in which customers pay only for the online computing resources they need.
Third Parties
External entities outside of the organization.
Outsourced Code Development
Contracting third parties to aid in the development of a program.
Data Storage
Third-party facilities used for storing important data.
Vendor Management
The process where organizations monitor and manage third party companies they are working with.