CompTIA Security+ Flashcards 2
study (132 cards)
Pass the Hash Attack
provides a captured authentication hash to try to act like an authorized user.
Internal vs. External
We most often think about the threat actors who exist outside our organizations: competitors, criminals, and the curious. However, some of the most dangerous threats come from within our own environments.
Level of Sophistication/Capability
range from the unsophisticated/unskilled attacker simply running code borrowed from others to the advanced persistent threat (APT) actor exploiting Vulnerabilities discovered in their own research labs and unknown to the security community.
Resources/Funding
Just as threat actors vary in their sophistication, they also vary in the resources available to them. Highly organized attackers sponsored by organized crime or national governments often have virtually limitless resources, whereas less organized attackers may simply be hobbyists working in their spare time.
Intent/Motivation
Attackers also vary in their motivation and intent. The unskilled attacker may be simply out for the thrill of the attack whereas competitors may be engaged in highly targeted corporate espionage.
Nation-states
seek to achieve political objectives; organized crime often focuses on direct financial gain.
OR
attackers hacking into either foreign governments or corporations.
Unskilled Attackers
the term script kiddie is a derogatory term for unskilled attackers who Use hacking techniques but have limited skills.
Hacktivists
Hacktivists Use hacking techniques to accomplish some activist goal.
Organized crime
appears in any case where there is money to be made, and cybercrime is no exception.
Advanced persistent threats (APTs)
describes a series of attacks that they first traced to sources connected to the Chinese military.
Zero-day attacks
Attacks that exploit these vulnerabilities. Zero-day attacks are particularly dangerous because they are unknown to product vendors, and therefore, no patches are available to correct them.
Insider attacks
occur when an employee, contractor, vendor, or other individual with authorized access to information and systems uses that access to wage an attack against the organization.
Shadow IT
individuals and groups seek out their own technology solutions
Attacker Motivations:
Data exfiltration
-Espionage
-Service disruption
-Blackmail
-Financial gain
-Philosophical/political belief
-Ethical attacks
-Revenge attacks
-disruption/chaos
-War
Data exfiltration
attacks are motivated by the desire to obtain sensitive or proprietary information, such as customer data or intellectual property.
Espionage
attacks are motivated by organizations seeking to steal secret information from other organizations. This may come in the form of nation-states attacking each other or corporate espionage.B35
Service disruption
attacks seek to take down or interrupt critical systems or networks, such as banking systems or health-care networks.
Blackmail
attacks seek to extort money or other concessions from victims by threatening to release sensitive information or launch further attacks.
Financial gain
attacks are motivated by the desire to make money through theft or fraud. Organized crime is generally motivated by financial gainas are other types of attackers.
Philosophical/political belief
attacks are motivated by ideological or political reasons such as promoting a particular cause or ideology. Hacktivists are generally motivated by philosophical or political beliefs.
Ethical attacks
or white-hat hacking are motivated by a desire to expose vulnerabilities and improve security. These attacks are often carried out by security researchers or ethical hackers with the permission of the organization being tested.
Revenge attacks
are motivated by a desire to get even with an individual or organization by embarrassing them or exacting some other form of retribution against them.
Disruption/chaos
attacks are motivated by a desire to cause chaos and disrupt normal operations.
War
may also be a motivation for cyberattacks. Military units and civilian groups may Use hacking in an attempt to disrupt Military operations and change the outcome of an armed conflict.