Chapter 6: Comparing Threats, Vulnerabilities, and Common Attacks Flashcards
(73 cards)
What are Nation-state Attackers?
Cyber actors sponsored by a government/nation-state, targeting other nations’ critical infrastructure or intellectual property for political or strategic purposes.
What is an Advanced Persistent Threat (APT)?
A prolonged and targeted cyber attack where attackers gain unauthorized access and maintain persistent access to a network to steal sensitive information or compromise systems.
In the context of Cybersecurity, what is Organized Crime?
Typically composed of a group of individuals working together in criminal activities. These groups are typically organized with a hierarchy composed of a leader and workers. The primary motivation of organized crime is money.
What is a Hacker?
Commonly refers to a malicious individual who gains unauthorized access to systems or networks, with motivations ranging from malicious intent to curiosity, personal challenge, or ideological reasons.
What is an Unskilled Attacker?
Someone who lacks advanced technical knowledge but uses basic tools, scripts, or social engineering to exploit vulnerabilities.
What is a Hacktivist?
An individual or group who uses hacking to protest or promote political, social, or environmental causes.
What is an Insider Threat?
A security risk posed by individuals within an organization who misuse their authorized access, either maliciously or accidentally, to harm the organization.
What is a Competitor?
A business or individual who may conduct cyber espionage or attacks to gain advantage by stealing sensitive information or intellectual property.
Name the three major attributes that distinguish different attackers?
Internal vs. External, Resources/funding, and level of sophistication/capability.
Name a couple of threat actor motivations.
Data exfiltration, disruption/chaos, financial gain, blackmail, service disruption, philosophical, political beliefs, ethical, revenge, espionage, and war.
What is a Threat Vector?
A method or pathway used by attackers to gain unauthorized access to a system or network.
What is a Message-based threat vector?
Cyberattacks delivered through email, messaging apps, or other communication channels, often using phishing or malicious links.
What is an Image-based threat vector?
Cyberattacks delivered through image files (PNGs, JPEG) to hide malicious code, exploiting vulnerabilities in image-rendering software to deliver malware.
What is a File-based threat vector?
Cyberattacks delivered through files with malicious code such as executables, documents, or scripts that are opened or executed on a system.
What is a Voice Call-based threat vector?
Cyberattacks delivered through phone calls (like vishing) to trick victims into giving up sensitive info by impersonating trusted sources.
What is a removable device threat vector?
Cyberattacks delivered through removable media such as USBs or SD cards to deliver malware directly to a system when plugged in.
What is a System-based threat vector?
Cyberattacks delivered through the exploitation of vulnerabilities in operating systems or applications, like unpatched software or weak configurations.
What is a Network-based threat vector?
Cyberattacks delivered through a network channel to attack systems, such as via packet injection, sniffing, or DoS attacks.
What is a Supply-chain threat vector?
Compromising third-party vendors or software providers to indirectly attack the target organization.
What is Shadow Information Technology (IT)?
Unauthorized hardware or software used without IT’s knowledge or approval, often creating security risks.
What is Malware?
Software designed to harm systems or steal data.
What is a Virus?
Malware that attaches to files and spreads when the host file is run.
What is a Worm?
Self-replicating malware that spreads across systems without needing a host file.
What is a Logic Bomb?
Malicious code activated by specific conditions or actions.