lessons 5-9 Flashcards
(146 cards)
Targeted attack
is when a threat actor chooses a target for a specific objective. The choice of the target is influenced by the perceived value of the outcome
Opportunistic attack
is when a threat actor takes advantage of a vulnerable target (not previously knowing them). the choice of target is generally influenced by work factors (Time effort and resources to accomplish a task)
Hacktivist
threat actor making a Political statement, generally talented. Funding variable
Organized crime (cyber criminals)
out to make money, well organized, well funded
Insiders | Shadow IT
someone at the organization that’s disgruntled
Script Kiddies
threat actor that does it for bragging rights or notoriety. Low level of sophistication
Hackers
financial gain, notoriety. Generally talented
NON-ADVERSARIAL THREATS
- Natural: natural occurrences such as earthquakes, floods, fire, pollutants, pandemics
- Operational: Loss of service like electricity, HVAC, technical issues, com, failure
- Human: Accidents, civil disturbances, work stoppages.
Threat Modeling
Is a structured process by which potential threats and threat actors can be identified, enumerated, and prioritized.
Asset-centric
What/why. Identifies valued assets and motivation
Architecture-centric
How. identifies system design components, strengths, and weaknesses.
Attacker-centric
Who- identifies the adversaries.
THREAT INTELLIGENCE
evidence-based knowledge about emerging threats that can be used to inform control decisions
OSINT - OPEN SOURCE INTELLIGENCE
is a term used to refer to the data collected from publicly available sources to be used in an intelligence context. OSINT framework is a structured collection of OSINT tools.
CISA
America’s cyber defense agency- resources, visit on a regular basis!
THREAT VECTOR
Also known as an attack vector is a potential pathway, or scenario that can be exploited
*Common threat vectors include: malicious emails in phishing attacks, weak or stolen passwords, drive-by download attacks, web applications, out of date applications or devices, and trusted relationships
attack surface
is the sum of all threat vectors.
DEFAULT CREDENTIALS
*Issue- initially set up by the vendor. Built-in admin username and password
*Impact- unauthorized access and compromise. Pathways to pivot to other devices- a quick Google search will usually reveal default credentials for a specific product.
*Causes- convenience, forgetfulness, laziness
*Response- change or disable the default credentials
WEAK PERMISSIONS
- Issue- are those that allow for unnecessary access (device, cloud, application)
- Impact- unauthorized access, access violations, privacy violations
- Causes- lack of understanding, poor classification, overconfidence.
- Response- documented policies and procedures. Management education, config. Management and standards
DATA EXFILTRATION
the unauthorized transfer of data from a computer or network, typically carried out by cyber attackers to steal sensitive information such as personal data, financial records, or intellectual property.
OPEN SOURCE PORTS
network ports that are actively listening for incoming connections and are accessible from outside the network.
* Issue- ports are those in listening mode
* Impact- exposure, potential exploit, unauthorized access, denial of service, integrity of device management
* Causes- poor or nonexistent config. Management, unrestricted permission to install a device or software
* Response- Config. Management, ongoing system hardening, account restrictions
UNSUPPORTED SYSTEMS & SOFTWARE
*Issue- 2 issues: unauthorized installation of devices/software OR end of life (EOL)/ end of support (EOS)
* Impact- exploits, compatibility issues, unauthorized access.
* Causes- lack of centralized control, and local admin privileges. Absence of refresh policies and lack of understanding.
* Response- refresh policies and standards, resource management, budget allocation
THIRD-PARTY THREAT VECTORS
include vendors, managed service providers (MSPs), business partners, consultants, and contractors that in some interact with our organization data
Fourth-parties
are vendors that third-party sources through- these manifest as risks to the organization