Threat Actors Flashcards

(51 cards)

1
Q

An individual or entity responsible for incidents that impact security & data protection.

A

Threat Actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Specific Characteristics or properties that define & differentiate various threat Actors from one another.

A

Threat Actor Attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Individuals with limited technical expertise who use readily available tools like downloaded scripts or exploits to carry out attacks.

A

Unskilled Attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cyber attackers, (individuals or groups), that use technical skills to carry out their activities driven by political, social, or environmental ideologies, who often want to draw attention, to promote a specific cause or drive social change instead of for personal gain.

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sophisticated well-structured groups or entities that execute cyber-attacks, leverage resources & technical skills for illicit financial gain, usually through methods like malware, ransomware, phishing campaigns, identity theft, or credit card fraud.

A

Organized Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Highly skilled attackers that are sponsored by governments to carry out cyber operations, espionage, sabotage, or cyber warfare against other nation states or specific targets, (organizations, or individuals), in a variety of industries.

A

Nation-state Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cyber-security threats that originate from within the organization.

A

Insider Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IT systems, devices, software, applications, and services that are managed and utilized without explicit organizational approval.

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Decoy systems, networks, or servers designed to attract & deceive potential attackers, simulating real-world IT assets to study their techniques.

A

Honeypots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network of honeypots to create an entire network of more complex decoy systems, designed to mimic an entire network of systems (servers, routers, & switches), to observe complex, multi-stage attacks.

A

Honey-nets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Decoy files placed within systems to lure in potential attackers & detect unauthorized access or data breaches.

A

Honey-files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Monitored fake pieces of data or resources with no legitimate value or use, like a fabricated user credential, inserted into databases or systems to alert administrators when they are accessed or used.

A

Honey-tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The unauthorized transfer of data from a computer.

A

Data Exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

One of the most common motivations for cyber-criminals.

A

Financial Gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attackers obtain sensitive or compromising information about an individual or an organization & threatens to release this information to the public unless certain demands are met.

A

Blackmail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Achieved by conducting a DDoS attack to overwhelm a network, service, or server with excessive amounts of traffic so that it becomes unavailable to its normal users.

A

Service Disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Individuals or groups use hacking to promote a political agenda, social change, or to protest against organizations they perceive as unethical.

A

Philosophical or Political
Beliefs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ethical hackers, also known as Authorized hackers, are motivated by a desire to improve security.

A

Ethical Reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An employee who is disgruntled, or one who has recently been fired or laid off, might want to harm their current or former employer by causing a data breach, disrupting services, or leaking sensitive information.

A

Revenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

These actors, often referred to as Unauthorized hackers, engage in malicious activities for the thrill of it, to challenge their skills, or simply to cause harm.

A

Disruption or Chaos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Involves spying on individuals, organizations, or nations to gather sensitive or classified information.

22
Q

Cyber-attacks have increasingly become a tool for nations to attack each other both on & off the battlefield.

23
Q

Individuals or entities within an organization who pose a threat to its security.

A

Internal Threat Actors

24
Q

Individuals or groups outside an organization who attempt to breach its cyber-security defenses.

A

External Threat Actors

25
Refers to the tools, skills, & personnel at the disposal of a given threat actor.
Resources & Funding
26
Refers to their technical skill, the complexity of the tools & techniques they use, & their ability to evade detection & countermeasures.
Level of Sophistication & Capability
27
Individuals with limited technical knowledge who use pre-made software or scripts to exploit computer systems & networks, without understanding the underlying principles.
Script Kiddie
28
Threat Actors with high levels of Sophistication & capabilities possessing advanced technical skills, sophisticated tools, & techniques.
High Level Threat Actor
29
An individual who lacks the technical knowledge to develop their own hacking tools or exploits.
Unskilled Attacker
30
The use of hacking & other cyber techniques used to promote or advance a political or social cause.
Hacktivism
31
Attack that is orchestrated in such a way that it appears to originate from a different source or group
False Flag Attack
32
Term that used to be used synonymously with a nation-state actor because of their long-term persistence & stealth.
Advanced Persistent Threat
33
Sophisticated piece of malware that was designed to sabotage the Iranian government's nuclear program.
Stuxnet Worm
34
Involves the use of personal devices for work purposes.
Bring Your Own Device (BYOD)
35
The means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action.
Threat Vector
36
Encompasses all the various points where an unauthorized user can try to enter data to or extract data from an environment
Attack Surface
37
Message-based threat vectors include threats delivered via email, simple massage service or SMS text messaging, or other forms of instant messaging.
Messages Threat Vector
38
Image-based threat vectors involve the embedding of malicious code inside of an image file by the threat actor.
Images Threat Vector
39
File-based threat vectors involve the use of malicious files to deliver a cyber threat.
Files-Based Threat Vector
40
Voice call-based threat vectors involve the use of voice calls to trick victims into revealing their sensitive information.
Voice Calls Threat Vector
41
Removable device threat vectors refer to threats delivered via removable Devices such as USB.
Removable Devices Threat Vector
42
Unsecure networks Threat vectors refer to the lack of appropriate security measures to protect networks.
Unsecure Networks Threat Vector
43
Set of vulnerabilities in Bluetooth technology that can allow an attacker to take over devices or spread malware.
BlueBorne
44
Type of DoS attack that targets Bluetooth-enabled devices by sending a specially crafted Logical Link Control & Adaption Protocol packet to a target device.
BlueSmack
45
Specific methods & Patterns of activities or behaviors associated with a particular threat actor or group of threat actors.
Tactics, Technique, & Procedures (TTPs)
46
Designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats.
Deceptive & Disruption Technologies
47
Fake DNS entries introduced into a system's DNS server.
Bogus DNS
48
Fake folders & files placed within a system's storage.
Decoy Directories
49
Used in websites to present ever-changing content to web crawlers to confuse and slow down the threat actor.
Dynamic Page Generation
50
Security mechanism where specific services or ports on a network devices remain closed until a specific outbound traffic pattern is detected.
Port Triggering
51
System can respond to an attacker's network scan attempt by sending out fake Telemetry or network data.
Fake Telemetry Data