Chapter 2 Flashcards
Threat Actor
An entity that is the cause of an event that has impacted the safety of another entity. Also called a malicious actor.
Avalanche Effect
In a hashing algorithm if one bit is changed then the entire hash is completely different
Advanced Persistent Threat (APT)
Highly sophisticated threat actors that can make constant attacks and have access to massive resources.
Unskilled attackers
A threat actor that runs premade scripts without any knowledge of what is haappening under the hood. “Script kiddies”
Hacktivist
A hacker with a purpose that is motivated by philosophy, revenge, disruption etc. Can be very sophisticated and motivated but often has access to limited funding.
Insider Threat
Someone from inside the organization who can use organization resources against itself for revenge, financial gain etc. Has knowledge of where to aattack and security vulnerabilities.
Organized Crime
Usually motivated by money, almost always an external entity. Very sophisticated. Lots of capital.
Shadow IT
Members of the organization that use workarounds to avoid the security put in place by the IT department. They often set up their own networks to get around limitations like change control and other security practices. Can be a huge risk.
Threat Vector
The method an attacker uses to gain access to the system. Also called “attack vector”
Phishing
Enticing someone to click on a link that can trick you into exposing sensitive data or installing malware. Social engineering intended to trick the recipient into thinking it is a legittimate communication or service.
Scalable Vector Graphic (SVG)
A image file format that can contain embedded code. Can be used to perform HTML injections or deliver javascript attack code.
File Based Vectors
More than just executables, malicous code can hide in many places such as: Adobe PDFs or microsoft office macros
Removable device vectors
USBs can be used to get around a firewall. These can be used to infect air gapped systems.
Air gapped Network
A network with no direct connection to the internet or other networks
802.1x
An authentication protocol that prevents the access of data or network resources until proper credentials are provided.
Supply Chain Vector
Tampering with the underlying infrastructure of manufacturing process to add vulnerabilities.
Managed Service Providers (MSP)
Monitors systems and informs you if things need to be changed. If an attacker can infiltrate an MSP they will have access to many organizations systems.
Typosquatting
URLs that are similar to the legitimate site but have slight changes.
Pretexting
Using sotries and lies to manipulate you into believing their story. Attacker is a character in the story they create.
Smishing
SMS phishing
Impersonation
The attacker pretending to be someone they arent. Could introduce themselves as someone higher in rank.
Identity Fraud
The attacker uses your information to impersonate you, giving them access to your resources and privileges.
Watering hole Attack
Infecting a 3rd party site that employees of the target organization frequent and use it and use it to gain access. Infect all users and then pursue their target.
Defense in Depth
Layering defense measures that can catch threats that others may have missed