Security+ SY0-701 - Chapter 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/54

flashcard set

Earn XP

Description and Tags

CompTIA Security+ Study Guide Exam SY0-701

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

Internal vs. External, Level of Sophistication/Capability, Resources/Funding, Intent/Motivation

Categories to consider when classifying cybersecurity threats.

2
New cards

White-Hat Hacker

Authorized attacker who seeks to discover security vulnerabilities with the intent of correcting them.

3
New cards

Black-Hat Hacker

Unauthorized attacker who seeks to defeat security controls and compromise the confidentiality, integrity, or availability of information systems for their own purposes.

4
New cards

Grey-Hat Hacker

Semi-authorized attacker who acts without proper authorization, but does so with the intent of informing their targets of any security vulnerabilities.

5
New cards

Unskilled, Hacktivist, Organized Crime, Nation-State, Insider Threat

Types of threat actors.

6
New cards

Script Kiddie

Unskilled attacker who relies almost entirely on automated tools.

7
New cards

Hacktivist

Attacker who uses hacking techniques to accomplish some activist goal.

8
New cards

Organized Criminal

Attacker who uses hacking techniques for illegal financial gain.

9
New cards

Acronym: APT

Advanced Persistent Threat

10
New cards

APT

Nation-state attacker who uses advanced techniques to repeatedly attempt to compromise a system.

11
New cards

Insider Threat

Employee, contractor, vendor, or other individual with authorized access to information systems who uses that access to wage an attack against their organization.

12
New cards

Shadow IT

Phenomenon where individuals and groups within an organization seek out their own technology solutions.

13
New cards

Data Exfiltration, Espionage, Service Disruption, Blackmail, Financial Gain, Personal Beliefs, Ethical, Revenge, Chaos, Geopolitical Conflict

Attacker motivations.

14
New cards

Data Exfiltration

Attack motivated by the desire to obtain sensitive or proprietary information.

15
New cards

Espionage

Attack motivated by organizations seeking to steal secret information from other organizations.

16
New cards

Service Disruption

Attack seeking to take down or interrupt critical systems or networks.

17
New cards

Blackmail

Attack seeking to extort money or other concessions from victims by threatening to release sensitive information or launch further attacks.

18
New cards

Financial Gain

Attack motivated by the desire to make money through theft or fraud.

19
New cards

Personal Beliefs

Attack motivated by ideological or political reasons, promoting a particular cause or ideology.

20
New cards

Ethical

Attack motivated by the desire to expose vulnerabilities and improve security.

21
New cards

Revenge

Attack motivated by the desire to get even with an individual or organization by embarrassing them or exacting some other form of retribution against them.

22
New cards

Chaos

Attack motivated by the desire to cause chaos and disrupt normal operations.

23
New cards

Geopolitical Conflict

Attack that attempts to disrupt military operations and change the outcome of an armed conflict.

24
New cards

Attack Surface

A system, application, or service that contains an exploitable vulnerability.

25
New cards

Threat Vector

The means that threat actors use to obtain access.

26
New cards

Email

One of the most commonly exploited threat vectors.

27
New cards

Email, SMS, Instant Messaging, Phone/Voice

Attack surfaces exploited by threat actors to carry out phishing attacks.

28
New cards

Acronym: MSP

Managed Service Provider

29
New cards

Supply Chain

Sophisticated attack that involves targeting an organization’s hardware providers, software providers, or service providers.

30
New cards

Threat Intelligence

Set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment.

31
New cards

Predictive Analysis

The application of threat intelligence to identify likely risks to the organization.

32
New cards

Acronym: OSINT

Open Source Intelligence

33
New cards

OSINT

Open source intelligence that can be gathered from publicly available sources.

34
New cards

Threat Feed

Source of intelligence that is intended to provide up-to-date details about in a way that an organization can leverage.

35
New cards

Acronym: CVE

Common Vulnerabilities and Exposures

36
New cards

IP Addresses, Hostnames, Domains, Email Addresses, URLs, File Hashes, File Paths, CVE Record Numbers

Information commonly found in a threat feed.

37
New cards

Vulnerability Database

A collection of CVEs intended to help direct an organizations defensive efforts, and provide valuable insight into the types of exploits being discovered by researchers.

38
New cards

Acronym: IoC

Indicators of Compromise

39
New cards

Ioc

Telltale signs that an attack has taken place, such as file signature, log patterns, or other evidence left behind.

40
New cards

File/Code Repositories

Common residence for lists of IoC.

41
New cards

Senki.org, Open Threat Exchange, MISP Threat Sharing Project, Threatfeeds.io

Examples of open source threat intelligence.

42
New cards

The Dark Web

A network run over standard internet connections, but using multiple layers of encryption to provide anonymous communication.

43
New cards

Closed-Source Intelligence

A proprietary collection of threat information and/or research.

44
New cards

Timeliness, Accuracy, Relevance

Common factors to consider when assessing threat intelligence.

45
New cards

Confidence Score

A tool used to summarize threat intelligence based on how trustworthy it is.

46
New cards

Acronym: STIX

Structured Threat Information eXpression

47
New cards

STIX

An XML language that defines domain objects such as attack patterns, malware, threat actors, and tools; and relates them to each other as either a “relationship” or “sighting” object.

48
New cards

Acronym: OASIS

Organization for the Advancement of Structured Information Standards

49
New cards

OASIS

The international nonprofit consortium that maintains STIX, along with many other projects related to information formatting.

50
New cards

Acronym: TAXII

Trusted Automated eXchange of Intelligence Information

51
New cards

TAXII

A companion to STIX, intended to allow cyber-threat information to be communicated at the application layer via HTTPS.

52
New cards

Acronym: ISAC

Information Sharing and Analysis Center

53
New cards

ISAC

A threat intelligence community aimed at helping infrastructure owners and operators help share threat information and provide tools and assistance to their members.

54
New cards

Acronym: TTP

Tactics, Techniques, and Procedures

55
New cards