SY0-701: 2.0 (Threats, Vulnerabilities, and Mitigations) Flashcards
(213 cards)
Vulnerability (2.3)
Any weakness in the system design or implementation (software bugs, misconfigures software. improperly protected network devices, missing security patches, lack of physical security)
Threat Actor Attributes (2.1)
Specific characteristics or properties that define and differentiate various threat actors from one another
Threat Actor (2.1)
Individual or entity responsible for incidents that impact security and data protection
Threat Actor Types (2.1)
Unskilled Attackers- baby hackers
Hacktivists- driven by cause
Organized Crime- driven by money
Nation-State Actors- cyber warfare/espionage
Insider Threats- revenge or accidental
Unskilled Attacker (2.1)
AKA Script Kiddie
Runs scripts w/ no knowledge of how it works
Hacktivist (2.1)
Individuals or groups that use their technical skills to promote a cause or drive a social change instead of for personal gain
Organized Crime (2.1)
Sophisticated and well-structured entities that leverage resources and technical skills for illicit gain
Nation-State Actor (2.1)
Highly trained and often funded by nation states/governments
Insider Threat (2.1)
Cybersecurity threats that originate from within an organization (malicious or accidental)
Threat Actor Motivations (2.1)
Data exfiltration
Espionage
Service disruption
Blackmail
Financial gain
Philosophical/political beliefs
Ethical
Revenge
Disruption/chaos
War
Threat Actor Attributes (2.1)
Internal / External
Resources / Funding (tools, skills, personnel)
Level of sophistication / Capability (technical skill, coimplexity of tools, ability to evade detection)
False Flag Attack (2.1)
Attack that is orchestrated in such a way that it appears to originate from a different source or group (popular style w/ nation-state groups)
APT (2.1)
Advanced Persistent Threat- Prolonged and targeted cyber attack in which an intruder gains unauthorized access to a network and remains undetected for an extended period of time while trying to steal data or monitor network activities rather than cause immediate damage
Shadow IT (2.1)
The use of information technology systems, devices, software, applications, and services without explicit organizational approval
Threat Vector (2.2)
Method used by an attacker to access a victim’s machine (e.g. a vulnerability; messages, images, files, etc.)
Attack Surface (2.2)
Encompasses all the various points where an unauthorized user can try to enter data to or extract data from an environment
BlueBorne (2.2)
Set of vulnerabilities in Bluetooth technology that can allow an attacker to take over devices or spread malware
BlueSmack (2.2)
Type of DOS attack that targets Bluetooth-enabled devices by sending a specially crafted Logical Link Control and Adaptation Protocol packet to a target device
Forms of Impersonation (2.2)
Impersonation
Brand Impersonation
Typosquatting
Watering Hole Attacks
Brand Impersonation (2.2)
Specific form of impersonation where an attacker pretends to represent a legitimate company or brand
Impersonation (2.2)
An attack where an adversary assumes the identity of another person to gain unauthorized access to resources or steal sensitive data
Typosquatting (2.2)
A form of cyber attack where an attacker registers a domain name that is similar to a popular website but contains some kind of common typographical errors
Watering Hole Attacks (2.2)
Targeted form of cyber attack where attackers compromise a specific website or service that their target is known to use
Pretexting (2.2)
Technique where an attacker provides some information that seems true in an attempt to get the victim to provide more information