Threat Actors Flashcards

1
Q

What are all of the Threat Actor Motivations?

A

Data Exfiltration

Financial Gain

Blackmail

Service Disruption

Philosophical or Policitial Beliefs

Ethical Reasons

Revenge

Disruption or Chaos

Espionage

War

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an Unskilled Attacker?

A

Someone who lacks the technical knowledge to develop their own hacking tools or exploits. Less likely to be motivated by financial gain or political ideologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Hacktivist?

A

Individuals or groups that use their technical skills to promote a cause or drive social change instead of for personal gain. Primarily motivated by their beliefs rather than trying to achieve financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Organized Crime?

A

Sophisticated and well-structured entities that leverage resources and technical skills for illicit gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Nation-State Actors?

A

Groups that are sponsored by a government to conduct cyber operations against other nations, organizations, or individuals. AKA (Advanced Persistent Threat) because of their long-term persistence and stealth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Insider Threats?

A

Cybersecurity threats that originate from within the organization. Varying levels of sophistication and damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Shadow IT?

A

The use of information technology systems, devices, software, applications, and services without explicit organizational approval. Use of personal devices for work purposes, installation of unapproved software, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Threat Vector?

A

The means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an Attack Surface?

A

Encompasses all of the various points where an unauthorized user can try to enter or extract data from an environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the types of Threat Vectors?

A

Messaging (emails, SMS, IM)

Images

Files

Voice calls

Removable Devices

Unsecured Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are TTPs?

A

Tactics, Techniques, and Procedures - Specific methods and patterns of activities or behaviours associated with a particular threat actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a HoneyPot?

A

Designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a HoneyNet?

A

Network of Honeypots to create a more complex system designed to mimic an entire network of systems, including servers, routers, and switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a HoneyToken?

A

A piece of data or a resource that has no legitimate value or use but it monitored for access or use. Useful for detecting insider threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Disruption Technologies examples?

A

Bogus DNS - Fake DNS entries introduced into a system’s DNS server

Decoy Directories - Fake folders and files placed within a system’s storage

Dynamic Page Generation - Used in websites to prevent ever-changing content to web crawlers to confuse and slow down the threat actor

Port Triggering - Security mechanism where specific services or ports on a network device remain closed until a specific outbound traffic pattern is detected

Fake Telemetry Data - The system can respond to an attacker’s network scan attempt by sending out fake telemetry or network data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly