Chapter 1: Key Terms Flashcards

(33 cards)

1
Q

Threat Actor

A

The individual or entity that is responsible `for attacks against the technology of enterprises and users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attributes

A

Characteristic features of the different groups of threat actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intent/Motivation

A

Reasons for an attack by threat actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hacker

A

A person who uses advanced computer skills to attack computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Black hat hackers

A

Threat actors who violate computer security for personal gain or to inflict malicious damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

White hat hackers

A

Hackers that probe a system with an organization’s permission to find weaknesses and report them to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Gray hat hackers

A

Hackers that probe a system without an organization’s permission to expose flaws the system and get the company to take action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Script Kiddies

A

Individuals who want to perform attacks yet lack the technical knowledge to carry them out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hacktivists

A

A group of attackers that is strongly motivated by ideology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

State Actors

A

Government-sponsored attackers who launch cyberattacks against the foes of the state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Advanced Persistent Threat (APT)

A

An attack that uses advanced methods to infect and silently extract data over an extended period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Insider Threat

A

Trusted employees that attack an organization from the inside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Competitors

A

Attackers who launch attacks against an opponent’s system to steal classified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Criminal Syndicates

A

Attackers that contract out their services to aid in criminal activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Shadow IT

A

Employees that install their own equipment or software that violates company policy and exposes the company to attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brokers

A

Attackers that sell their knowledge of a weakness to other attackers or governments.

17
Q

Cyberterrorists

A

Attackers that attack a nation’s network to cause disruption and panic among citizens.

18
Q

Legacy Platform

A

An older platform that no longer widespread.

19
Q

On-premises Platform

A

A platform that remains within the physical confines of an enterprise.

20
Q

Cloud Platform

A

A pay-per-use computing model in which customers pay only for the online computing resources they need.

21
Q

Third Parties

A

External entities outside of the organization.

22
Q

Outsourced Code Development

A

Contracting third parties to aid in the development of a program.

23
Q

Data Storage

A

Third-party facilities used for storing important data.

24
Q

Vendor Management

A

The process where organizations monitor and manage third party companies they are working with.

25
System Integration
Connectivity between the systems of an organization and its third parties.
26
Lack of Vendor Support
A lack of expertise to handle system integration.
27
Patch
An officially released software security update intended to repair a vulnerability.
28
Firmware
Software that is embedded into hardware to provide low-level controls and instructions.
29
Zero Day
A vulnerability that is exploited by attackers before anyone else even knows it exists.
30
Attack Vector
A pathway or avenue used by a threat actor to penetrate a system.
31
Email Vector
An attack vector in which an attacker delivers malware through email.
32
Wireless Vector
An attack vector in which an attacker intercepts data as it travels across a wireless network.
33
Removable Media Vector
An attack vector in which an attacker uses removeable media such as a flash drive to infect a system.