Outsmarting Threat Actors Flashcards
(11 cards)
What are tactics, Techniques, and Procedures (TTPs)?
Specific methods and patterns of activities or behaviors associated with a particular threat actor or group of threat actors
What are Deceptive and Disruption Technologies?
Technologies designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats
What are Honeypots?
Decoy system or network set up to attract potential hackers
What are Honeynets?
Network of honeypots to create a more complex system that is designed to mimic an entire network of systems
What are Honey files?
Decoy file placed within a system to lure in potential attackers
What are Honeytokens?
Piece of data or are source that has no legitimate value or use, but is monitored for access or use
What are Bogus DNS entries?
Fake Domain Name System entries introduced into your system’s DNS server
What are Decoy directories?
Fake folders and files placed within a system’s storage
What is a Dynamic page generation?
Effective against automated scraping tools or bots trying to index or steal content from your organization’s website
What is Port triggering?
Security mechanism where specific services or ports on a network device remain closed until a specific outbound traffic pattern is detected
What occurs in a Spoofing fake telemetry data?
When a system detects a network scan is being attempted by an attacker, it can be configured to respond by sending out fake telemetry or network data