Chapter 2 Flashcards
(112 cards)
Threat actor
Any person or group who presents a security risk
nation state actors
Highly skilled, highly funded government-sponsored attackers
hactivist
Attacks for ideological reasons, often highly sophisticated with little resources/funding
unskilled attacker (script kiddie)
attackers with little skill and little funding
Insider threat
many resources, medium sophistication, employee out for revenge or financial gain, takes advantage of organization knowledge, knows exactly where to hit vulnerable systems
Organized crime
highly funded, highly sophisticated, motivated by money
Shadow IT
many resources, low sophistication, group that doesn’t want to deal with IT dept regulations, circumvents existing IT
Threat vector
Method used by an attacker to access a victim’s machine
Agentless
Executable that does not require installation, such as a web-based executable
Client-based
Executable that requires installation, think installed malware
Unsupported systems
Outdated operating systems no longer supported by the manufacturer; no patches exist
WEP, WPA, WPA2, WPA3
Wireless network security protocols used to encrypt wireless traffic. WPA3 is most secure and up to date.
802.1X
A port-based authentication protocol. Prevents access to the network unless someone provides proper credentials. Can be used wireless or wired.
Bluetooth
Attackers can use bluetooth for reconnaissance to determine location
TCP
Transmission Control Protocol. A port. TCP is usually seen as TCP/IP in writing.
UDP
User Datagram Protocol. A port.
Open port vector
an opportunity for an attacker. Could be due to a misconfiguration or a system vulnerability.
Default credentials
if you keep default credentials, very easy for attackers to gain access
MSP
Managed service provider
Supply chain vector
An attacker could gain access to a network using a vendor or a supplier. Think 2013 target CC breach and counterfeit Cisco hardware being delivered
Phishing
Social engineering, usually delivered by email, SMS. Usually grammar, spacing, URL not quite right. Creates a sense of urgency to click a malicious link.
Business Email Compromise (BEC)
Attacker pretends to be a trusted business for financial gain
BEC
Business Email Compromise
Pretexting
Lying to get information, often creating stories.