Lesson 2: Compare Threat Types Flashcards

1
Q

Define ‘Risk’

A

Likelihood/consequence of a threat actor exercising a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the reason for calculating risk?

A

To determine the likelihood/imapct that a successful exploit would have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define a ‘Vulnerability’

A

A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List examples of a vulnerability

A

Misconfiguration of hardware/software or network device; out-of-date software/firmware; poor network architecture; inadequate policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What determines how vulnerable an asset is?

A

The value of the asset and ease of exploiting the fault.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define a ‘Threat’

A

Attack vector; The potential for someone/something to exploit a vulnerability and breach security intentionally or unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define an external threat actor

A

Has no authorized access to the target system; Infiltrates the security system using unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define an internal threat actor

A

Was granted permissions on the system; Typically an employee, contractors or business partners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are general motivations for perpetrating a cyber attack?

A

Greed/Financial, Curiosity/Chaos, Grievance/Revenge, Political

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List 3 general strategies/method threat actors use to perpetrate a cyber attack

A
  1. Service Disruption
  2. Data exfiltration
  3. Disinformation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define ‘Service Disruption’

A

Type of attack that compromises the availability of an asset or business process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define ‘Data Exfiltration’

A

Process by which an attacker takes data stored in a private network and moves it to an external network without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define ‘Disinformation’

A

Type of attack that falsifies an information resource that is normally trusted by others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List examples of a disinformation attack

A

Changing the content of a website; Manipulating search engines to inject fake sites; Using bots to post false information to social media sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define a ‘Hacktivist’

A

Threat actor motivated by a social issue or political cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define an advanced persistent threat (APT)

A

Ability of an adversary to achieve ongoing compromise of network security (obtaining and maintaining access).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define a ‘Nation-state actor’

A

Threat actor that is supported by the resources of its host country’s military and security services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the typical targets of nation-state actors?

A

Energy, health, and electoral systems/organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the typical goals of nation-state actors?

A

Primarily disinformation and espionage for strategic advantage - typically not for financial reason.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is ‘Shadow IT’?

A

Computer hardware, software, or services used on a private network without authorization from the system owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the typical motivations/goals of an internal/insider threat actor?

A

Revenge and Financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which three types of threat actor are most likely to have high levels of funding?

A

State actors, organized crime, and competitors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define an ‘Attack Surface’

A

All the points at which a malicious threat actor could try to exploit a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are examples of what could be apart of an attack surface?

A

Any location or method where a threat actor can interact with a network port, application, computer, or user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define the process of minimizing attack surface

A

Restricting access so that only trusted endpoints, protocols/ports, and services are permitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define a ‘Threat Vector’

A

A specific path a threat actor uses to gain unauthorized access to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define ‘Vulnerable software’

A

Contains a flaw in its code or design that can be exploited to circumvent access control or to crash the process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define an ‘Unsupported System/Application’

A

System/Application whose vendor no longer develops updates and patches for the product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the two vectors a software vulnerability is exploited?

A
  1. Remote
  2. Local
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define a ‘Remote’ exploit

A

An exploit performed by sending code to the target over a network and does not depend on an authenticated session with the target to execute.

31
Q

Define a ‘Local’ exploit

A

The exploit code must be executed from an authenticated session on the computer; Threat actor needs to use some valid credentials or hijack an existing session to execute it.

32
Q

Define an ‘Unsecure Network’

A

One that lacks the attributes of confidentiality, integrity, and availability.

33
Q

What constitutes an unsecure network?

A

Unnecessary open ports, weak/no authentication, use of default credentials, or lack of secure communications/encryption.

34
Q

What is the outcome from a ‘Lack of Confidentiality’

A

Allows threat actors to snoop on network traffic and recover passwords or other sensitive information.

35
Q

What is the outcome from a ‘Lack of Integrity’

A

Allows threat actors to use unauthorized devices to manipulate traffic/data, run exploit code, or spoof a service.

36
Q

Define a ‘Lack of Availability’

A

Threat actors are able to perform service disruption attacks; aka denial of service (DoS) attacks.

37
Q

What are qualities of a secure network?

A

Uses an access control framework and cryptographic to identify, authenticate, authorize, and audit network users, hosts, and traffic.

38
Q

Define a ‘Direct Access’ threat vector

A

Threat actor uses physical access to the site to perpetrate an attack; Unlocked workstation, boot disk to install malicious tool, stealing a PC/disk drive.

39
Q

Define a ‘Wired Network’ threat vector

A

Threat actor accesses a site to attach an unauthorized device to a physical network port.

40
Q

Define a ‘Remote and Wireless Network’ threat vector

A

Attacker obtains credentials for remote access or wireless connection to the network or cracks the security protocols used for authentication; Rouge/spoofed APs/Evil Twin APs

41
Q

Define a ‘Cloud Access’ threat vector

A

Gaining access to a cloud system through an account/service/hose with weak configuration; Potentially attacking a cloud service provider.

42
Q

Define a ‘Bluetooth Network’ threat vector

A

Threat actor exploits a vulnerability or misconfiguration to transmit a malicious file to a user’s device over Bluetooth.

43
Q

Define a ‘Default Credentials’ threat vector

A

Attacker gains control of a network device or app because it has been left configured with a default password.

44
Q

Define a ‘Open Service Port’ threat vector

A

Threat actor is able to establish an unauthenticated connection to a logical TCP or UDP network port.

45
Q

Define a ‘Lure’ threat vector

A

Entices a victim into interacting with a removable device, file, image, or program that conceals malware.

46
Q

What is the purpose of a lure attack?

A

If the threat actor cannot gain access to run a remote or local exploit directly, a lure might trick a user into facilitating the attack.

47
Q

How are lure attacks prevented?

A

Vulnerability management, antivirus, program execution control, and intrusion detection.

48
Q

What is the typical attack vector used to deliver a lure attack?

A

Any form of direct messaging; Email, SMS, Instant Messaging (iMessage), Websites/Social Media

49
Q

Define a ‘Supply chain’

A

End-to-end process of supplying, manufacturing, distributing/providing goods and services to a customer.

50
Q

Define ‘procurement management’

A

Process of ensuring reliable sources of equipment and software

51
Q

Define a ‘Supplier’ in a supply chain

A

Obtains products directly from a manufacturer to sell in bulk to other businesses; Referred to as business to business (B2B).

52
Q

Define a ‘Vendor’

A

Obtains products from suppliers to sell to retail businesses (B2B) or directly to customers (B2C); Might add some level of customization and direct support for the product(s).

53
Q

Define a ‘Business Partner’

A

Implies a closer relationship where two companies share quite closely aligned goals and marketing opportunities.

54
Q

Define a ‘managed service provider’ (MSP)

A

Provisions and supports IT resources such as networks, security, or web infrastructure.

55
Q

What is the downside of using a managed service provider (MSP)?

A

Difficult to monitor the MSP; The MSP’s employees are all potential sources of insider threat.

56
Q

What nmap option performs a scan that displays service identification?

A

-sV

57
Q

What are two primary response options to the discovery of an open port hosting an insecure service?

A

Close the exposed port and configure service encryption if its a necessary service.

58
Q

Define ‘Social engineering’

A

Hacking the human; Goal is to deceive unsuspecting users into providing sensitive data or violating security guidelines in preparation for an intrusion or to effect an actual intrusion.

59
Q

Define ‘Impersonation’

A

Social engineering attack where an attacker pretends to be someone they are not.

60
Q

What are the two types of impersonation attacks?

A
  1. Persuasion/liking
  2. Coercion/threat/urgency
61
Q

Define ‘Pretexting’

A

Social engineering tactic communicating a lie or half-truth in order to get someone to trick a victim; Combination of persuasion and coercion.

62
Q

Define ‘Phishing’

A

Email/SMS based attack that persuades the target into interacting with a malicious resource or providing sensitive data disguised as a trusted source.

63
Q

What two attack methods combine to create phishing?

A

A combination of social engineering and spoofing.

64
Q

Define ‘Vishing’

A

A human-based attack where the attacker extracts information over the phone or VoIP.

65
Q

Define ‘Pharming’

A

Impersonation attack that corrupts the name resolution process and redirects users from a legitimate website to a malicious one.

66
Q

What do phishing and pharming both depend on?

A

Impersonation and spoofing.

67
Q

Define ‘Typosquatting’

A

Attacker registers a domain name with a common misspelling of an existing domain, so a user who misspells a URL into a browser is taken to the attacker’s website.

68
Q

Define ‘Business email compromise’

A

Impersonation attack where the attacker gains control of an employee’s account and uses it to convince other employees to perform fraudulent actions.

69
Q

Define ‘Brand impersonation’

A

Threat actor accurately duplicates a company’s logos and formatting to make a phishing message or pharming website a compelling fake.

70
Q

Define ‘Disinformation’

A

Refers to a purposeful motivation to deceive.

71
Q

Define ‘Misinformatoin’

A

Refers to repeating false claims or rumors without the intention to deceive.

72
Q

Define a ‘watering hole attack’

A

Attacker targets specific groups or organizations, discovers which websites they frequent, and injects malicious code into those sites to infect the targets once they interact with the resource.

73
Q

Define a ‘Whaling’ attack

A

Spear-phishing attack directed at high-level executives where attackers masquerade as legitimate, known and trusted entities and encourage a victim to share highly sensitive information or to send a wire transfer to a fraudulent account.