Classifying Threats Flashcards

(35 cards)

1
Q

An individual or group with advanced skills and funding, typically aligned with a nation’s interests.

A

Nation-state actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An attacker motivated by ideology or social change, often using public defacement or data leaks.

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An insider who intentionally or unintentionally compromises security by leaking or mishandling data.

A

Insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat actors that aim for financial gain through organized campaigns like ransomware and fraud.

A

Organized crime group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An individual who uses pre-built tools or scripts to launch attacks with little technical knowledge.

A

Script kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attacker who attempts to gain business secrets to undermine a competitor’s advantage.

A

Corporate espionage threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The type of attack in which an adversary targets a software vendor to compromise multiple clients.

A

Supply chain attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A tactic where attackers scan for open ports across a wide IP range without targeting specific victims.

A

Opportunistic scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A threat actor with defined objectives, using stealthy techniques over an extended period.

A

Advanced Persistent Threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The type of threat where third-party vendors or service providers introduce vulnerabilities.

A

Third-party risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A person who violates ethical norms but may help organizations by disclosing vulnerabilities.

A

Gray hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The cybersecurity threat resulting from unsupported operating systems or legacy equipment.

A

Obsolescence risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attack that manipulates domain name resolution to redirect traffic to malicious sites.

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A threat based on manipulating people into bypassing normal security procedures.

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A criminal that targets high-ranking officials through deceptive emails.

A

Whaling attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The threat that comes from poor configuration, weak access controls, or open services.

A

Misconfiguration

16
Q

A method of attack that simulates real adversaries to test an organization’s defenses.

17
Q

A malware type that doesn’t require user interaction and spreads across systems automatically.

18
Q

An attacker motivated by personal revenge against an employer or coworker.

A

Malicious insider

19
Q

The classification model that breaks threats down by motive, capability, and opportunity.

A

Threat actor profiling

20
Q

An attack that occurs due to accidental internal user actions, such as misdirected emails.

A

Unintentional insider threat

21
Q

A targeted threat actor with specific knowledge of the organization’s environment.

A

Insider with elevated privileges

22
Q

The concept that no user, system, or device is inherently trusted within the network.

A

Zero Trust security model

23
Q

The motivation behind ransomware gangs demanding cryptocurrency payments.

A

Financial gain

24
A threat vector that relies on outdated protocols like FTP or Telnet still being enabled.
Insecure protocol usage
25
Attackers who compromise infrastructure to remain dormant until activated.
Sleeper cell threat
26
A person or group testing systems without permission, often for malicious purposes.
Black hat hacker
27
The threat resulting from default passwords and unchanged credentials.
Credential misuse
28
The threat posed by AI-generated phishing emails that closely mimic human writing.
AI-driven social engineering
29
When attackers hijack legitimate remote access tools to avoid detection.
Living off the land (LotL) technique
30
The type of threat that uses insider knowledge to evade traditional detection tools.
Insider-initiated lateral movement
31
The concept of assessing a threat based on both its likelihood and potential damage.
Threat classification and prioritization
32
An actor operating under unofficial state sponsorship, often disavowed by the government.
State-aligned proxy
33
A threat targeting organizations using unsanctioned SaaS apps and cloud storage.
Shadow IT risk
34
A threat actor that collects data over time for a future, larger coordinated attack.
Intelligence gatherer