Threat Landscape Flashcards

(21 cards)

1
Q

What are Cyber Stalkers / Bullies primarily associated with?

A

Social media and text messages

Includes activities like trolling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who are Hacktivists?

A

Cyber vigilantes engaged in political activism

Often operate in loosely affiliated groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What techniques do Thieves use?

A

Techniques that have worked for years

Organized crimes range from theft to hacking to distribution of illicit materials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What types of espionage are conducted by Spies?

A

International, corporate, and research

Sometimes conducted by insiders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What activities do Terrorists engage in within the cyber domain?

A

Promotional/marketing, communications, raise funds, defacement, cyber attacks

These activities aim to disrupt and create fear.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the acronym APT stand for?

A

Advanced Persistent Threats

Refers to nation-state cyber warfare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two enablers for the current complexity of the cyber ecosystem?

A

Sharing of information and protection of information

These factors contribute to both threats and defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What characterizes unstructured attacks?

A

Opportunistic or for reconnaissance purposes

Targets are selected based on automated scans and blanket vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are structured attacks different from unstructured attacks?

A

More organized and elegant, conducted in phases

Can cause significant damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What defines direct attacks?

A

Attacks looking to compromise specific flaws in real time

Often targeted and intentional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are indirect attacks characterized by?

A

Indiscriminate actions, such as spreading a worm or email

Typically not aimed at a specific target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does MITRE ATT&CK stand for?

A

Tactics, techniques, and procedures used by cyber threat actors

It provides a framework for understanding cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are tactics in the context of MITRE ATT&CK?

A

Patterns, activities, and methods a cyber threat actor may use

Examples include reconnaissance and exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are techniques in MITRE ATT&CK?

A

Intermediate steps in a cyber threat actor’s plan of attack

Includes actions like network infiltration and lateral movements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are procedures in MITRE ATT&CK?

A

Specific steps of a technique, unique to a specific attack

They detail how techniques are executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a primary goal of a threat actor when gaining access to a system?

A

Consolidation and Exploitation, Evading Defenses and Detection, Discovery and Lateral Movement, harm CIA and accomplish attack outcomes

This often involves multiple steps and techniques.

17
Q

What does consolidation and exploitation involve?

A

Escalate access to administrative access and maintain remote access

This is crucial for long-term control of compromised systems.

18
Q

What tactics are used for evading defenses and detection?

A

Clearing of logs

Helps maintain stealth during an attack.

19
Q

What is involved in the discovery and lateral movement phase?

A

Assessing local system information and improving access to administrative levels

This often includes credential manipulation.

20
Q

What is the purpose of reconnaissance in cyber attacks?

A

To gather information for creating payloads and exploiting systems

Enables further attacks by identifying vulnerabilities.

21
Q

Fill in the blank: Once stable access is achieved, a threat actor can harm ______ and accomplish attack outcomes.

A

CIA

CIA stands for Confidentiality, Integrity, and Availability.