Threat Actors Flashcards
Objectives 1.2, 2.1, and 2.2 (77 cards)
Informational
Threat Actor Motivations
Threat Actors
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
- Data Exfiltration
- Blackmail
- Espionage
- Service Disruption
- Financial Gain
- Philosophical / Politcal Beliefs
- Ethical Reasons
- Revenge
- Disruption / Chaos
- War
Threat Actors
Informational
Informational
Threat Actor Attributes
Threat Actors
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
- Internal vs. External Threat Actors
- Differences in resources and funding
- Level of sphistication
Threat Actors
Informational
Define / Explain
Unskilled Attackers
Threat Actors
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
Limited technical expertise, use readily available tools
Threat Actors
Types of Threat Actors
Define / Explain
Hacktivists
Threat Actors
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
Driven by political, social, or environmental ideologies
Threat Actors
Types of Threat Actors
Define / Explain
Organized Crime
Threat Actors
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
Execute cyberattacks for financial gain (e.g., ransomeware, identity theft)
Threat Actors
Types of Threat Actors
Define / Explain
Nation-state Actor
Threat Actors
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
Highly skilled attackers sponsored by governments for cyber espionage or warfare
Threat Actors
Types of Threat Actors
Define / Explain
Insider Threats
Threat Actors
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
Security threats originating from within the organization
Threat Actors
Types of Threat Actors
Define / Explain
Shadow IT
Threat Actors
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
IT systems, devices, software, or services managed without explicit organizational approval
Threat Actors
Shadow IT
Informational
Threat Vectors and Attack Surfaces
Threat Actors
Obj. 2.2 - Explain common threat vectors and attack surfaces | Threat Actors
- Message-based
- Image-based
- File-based
- Voice Calls
- Removable Devices
- Unsecured Networks
Threat Actors
Informational
Define / Explain
Honeypots
Threat Actors
Deception and Disruption Technologies | Threat Actors
Decoy systems to attract and deceive attackers
Threat Actors
Define / Explain
Define / Explain
Honeynets
Threat Actors
Deception and Disruption Technologies | Threat Actors
Network of decoy systems for observing complex attacks
Threat Actors
Define / Explain
Define / Explain
Honeyfiles
Threat Actors
Deception and Disruption Technologies | Threat Actors
Decoy files to detect unauthorized access or data breaches
Threat Actors
Define / Explain
Define / Explain
Honeytokens
Threat Actors
Deception and Disruption Technologies | Threat Actors
Fake data to alert administrators when accessed or used
Threat Actors
Define / Explain
Define / Explain
Threat Actors Intent
Threat Actor Motivations
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
Specific objective or goal that a threat actor is aiming to achieve through their attack
Threat Actor Motivations
Define / Explain
Define / Explain
Threat Actors Motiviation
Threat Actor Motivations
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
Underlying reasons or driving forces that pushes a threat actor to carry out their attack
Threat Actor Motivations
Define / Explain
Define / Explain
Data Exfiltration
Threat Actor Motivations
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
Unauthorized transfer of data from a computer
Threat Actor Motivations
Define / Explain
Define / Explain
Financial Gain
Threat Actor Motivations
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
Achieved through various means, such as ransomware attacks, or through banking trojans that allow them to steal financial information in order to gain unauthorized access into the victims’ bank accounts
Threat Actor Motivations
Define / Explain
Define / Explain
Blackmail
Threat Actor Motivations
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
Attacker obtains sensitive or compromising information about an individual or an organization and threatens to release this information to the public unless certain demands are met
Threat Actor Motivations
Define / Explain
Informational
Service Disruption
Threat Actor Motivations
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
Some threat actors aim to disrupt the services of various organizations, either to cause chaos, make a political statement, or to demand a ransom
Threat Actor Motivations
Define / Explain
Informational
Philosophical / Political Beliefs
Threat Actor Motivations
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
- Attacks that are conducted due to the philosophical or political beliefs of the attackers is known as hacktivism
- Common motivation for a specific type of threat actor known as a hacktivist
Threat Actor Motivations
Informational
Informational
Ethical Reasons
Threat Actor Motivations
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
Contrary to malicious threat actors, ethical hackers, also known as authorized hackers, are motivated by a desire to improve security
Threat Actor Motivations
Informational
Informational
Revenge
Threat Actor Motivations
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
It can also be a motivation for a threat actor that wants to target an entity that they believe has wronged them in some way
Threat Actor Motivations
Informational
Informational
Disruption / Chaos
Threat Actor Motivations
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
Created and spreading malware to launching sophisticated cyberattacks against the critical infrastructure in a populated city
Threat Actor Motivations
Informational
Define / Explain
Espionage
Threat Actor Motivations
Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors
Spying on individuals, organizations, or nations to gather sensitive or classified information
Threat Actor Motivations
Define / Explain