Section 2: Threat Actors Flashcards

(29 cards)

1
Q

Data Exfiltration

A

Unauthorized transfer of data from a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Blackmail

A

Obtaining sensitive or compromising information and threatening to release it unless demands are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Espionage

A

Spying on individuals, organizations, or nations to gather sensitive or classified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Service Disruption

A

Disrupting services to cause chaos, make a political statement, or demand a ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Financial Gain

A

Achieving profit through means such as ransomware attacks or banking trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Philosophical/Political Beliefs

A

Hacktivism driven by political, social, or environmental ideologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ethical Reasons

A

Ethical hackers motivated by improving security rather than malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Revenge

A

Targeting an entity perceived to have wronged the threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disruption/Chaos

A

Spreading malware or launching cyberattacks to create chaos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

War

A

Cyber warfare to disrupt a country’s infrastructure, compromise national security, or cause economic damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internal vs. External Threat Actors

A

Internal threats: originate from within the organization
external threats: come from outside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unskilled Attackers

A

Limited technical expertise, using readily available tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hacktivists

A

Motivated by ideological beliefs, using cyber techniques to promote causes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Organized Crime

A

Sophisticated groups executing cyberattacks for financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nation-state Actor

A

Government-sponsored, highly skilled attackers conducting cyber espionage or warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Insider Threats

A

Security threats from within the organization, potentially from disgruntled employees

17
Q

Shadow IT

A

IT systems, devices, software, or services managed without explicit organizational approval

18
Q

Message-based Attacks

A

Delivered via email, SMS, or instant messaging, often involving phishing

19
Q

Image-based attacks

A

Malicious code embedded in image files

20
Q

File-based attacks

A

Malicious files disguised as legitimate documents or software

21
Q

Voice Calls attacks

A

Vishing attacks using voice calls to extract sensitive information

22
Q

Removable Devices attacks

A

Baiting tactics involving malware-infected USB drives

23
Q

Unsecured Networks attacks

A

Exploiting vulnerabilities in wireless, wired, or Bluetooth networks

24
Q

Honeypots

A

Decoy systems to attract and deceive attackers

25
Honeynets
Network of decoy systems to observe complex attacks
26
Honeyfiles
Decoy files to detect unauthorized access or data breaches
27
Honeytokens
Fake data to alert administrators when accessed or used
28
Tactics, Techniques, and Procedures (TTPs)
Specific methods and behaviors associated with particular threat actors
29
Deceptive and Disruption Technologies
Tools designed to mislead and neutralize attackers