Chapter 2 Flashcards
(13 cards)
What are the common types of threat actors?
Nation-state, Unskilled attacker, Hacktivist, Insider threat, Organized crime, Shadow IT
Each type of actor has different motivations and capabilities.
What attributes are used to classify threat actors?
Internal/external, Resources/funding, Level of sophistication/capability
These attributes help in understanding their potential impact and methods.
What are some motivations of threat actors?
Data exfiltration, Espionage, Service disruption, Blackmail, Financial gain, Philosophical/political beliefs, Ethical, Revenge, Disruption/chaos, War
Understanding motivations can aid in predicting and preventing attacks.
What are common threat vectors?
Message-based, Image-based, File-based, Voice call, Removable device, Vulnerable software, Unsupported systems and applications, Unsecure networks, Open service ports, Default credentials, Supply chain
Each vector presents unique challenges for security.
Fill in the blank: A common threat vector that involves emails and SMS is called _______.
Message-based
Message-based attacks exploit human interaction.
What types of networks are considered insecure?
Wireless, Wired, Bluetooth
Insecure networks can be easily exploited by attackers.
What is a common vulnerability related to software?
Unsupported systems and applications
These systems may not receive security updates, making them easier targets.
True or False: Default credentials can be a common attack surface.
True
Many systems are left with default credentials, making them vulnerable.
What is the significance of supply chain vulnerabilities?
Managed service providers (MSPs), Vendors, Suppliers
Compromise at any level can affect the entire supply chain.
Domain 4.0: Security Operations
• Identification methods (Threat feed
Open-sourc
intelligence (OSINT)
Proprietary/third-party
Information-sharing organization
Dark web)