Objective 1.5 - Threat Actors, Vectors, and Intelligence Sources

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Advanced Persistent Threat (APT)

a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations such as governments

2
New cards

Insider threats

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident - like giving up or losing passwords, or leaving them ON the computer which leaves the door open for hackers

3
New cards

State actors

Term used to describe Nation-States when they interact on the world stage implementing their foreign policies.

4
New cards

Hacktivists

Hackers who are driven by a cause like social change, political agendas, or terrorism

5
New cards

Script Kiddies

Inexperienced, usually young hackers who use programs that others have developed to attack computer and network systems and deface Web sites.

6
New cards

Criminal Syndicates

Threat actors who have moved from traditional criminal activities to more rewarding and less risky online attacks.

7
New cards

Hackers

Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge

8
New cards

Authorized Hackers

An ethical hacker who has good intentions and many times find problems to help find a resolution for them.

9
New cards

Unauthorized Hackers

Malicious, violates security for personal gain (Black Hat)

10
New cards

Semi-authorized hackers

a hacker who finds a vulnerability and doesn't use it against the victim

11
New cards

Shadow IT

The information systems and solutions built and deployed by departments other than the information systems department. In many cases, the information systems department may not even be aware of these efforts.

12
New cards

Resources/funding (attributes of actors)

APTs, and nation states have a penchant for long-term attacks, which requires this which only major organizations or government can manage over time.

13
New cards

Intent/motivation (attributes of actors)

This can be simple or multifold in nature. A script kiddie is just trying to make a technique work. A more skilled threat actor is usually pursuing a specific objective, such as trying to make a point as a hacktivist. At the top of the intent pyramid is the APT threat actor, whose intent or motivation is at least threefold.

14
New cards

Wireless Attack Vectors

An attack vector that is based on wireless networks and has many different openings, including:

Default login credentials

Rogue access point

Evil twin

Protocol vulnerabilities

15
New cards

Email attack vectors

One of the biggest and most successful known attack vectors because everyone has one. A form of communication that is commonly attacked and contains things such as:

Phishing attacks

Delivering malware to the user

Social engineering attacks

16
New cards

Supply Chain Attack Vector

Tampers with underlying infrastructure (gaining access to a network using a vendor, using malware to modify a process, using counterfeit equipment to install backdoors and implement substandard performance/availability)

17
New cards

Social Media Attack Vectors

An attack vector based on popular social platforms that allow attackers to utilize personal information you publish and make available, such as where you are or vacation pictures.

18
New cards

Removable Media Attack Vector

The attacker conceals malware on a USB thumb drive or memory card and tries to trick employees into connecting the media to a PC, laptop, or smartphone.

19
New cards

Cloud attack vectors

Publicly facing applications and services are commonly misconfigured and mistakes are made all the time which can be abused. This attack vector allows attackers to do things such as phish users of the cloud service, brute force attack the service, or make the cloud build new application instances to cause a DoS and waste money.

20
New cards

Open-Source Intelligence (OSINT)

Information that is readily available to the public and doesn't require any type of malicious activity to obtain.

21
New cards

Closed/proprietary threat intelligence source

Software code or security research that remains in the ownership of the developer and may only be used under permitted license conditions.

22
New cards

Vulnerability databases

Common source of threat intelligence, researchers find vulnerabilities and upload them here because everyone needs to know about them.

Examples of this are:

CVE (Common vulnerabilities and exposures)

U.S. National Vulnerability Database (NVD)

23
New cards

Public/Private information sharing centers

A public/private threat intelligence that you can share high-detail vulnerability information, companies like Cyber Threat Alliance lets members specifically upload about particular threats

24
New cards

Dark web intelligence

Involves the monitoring of forums, hacking groups and services on overlay networks that use the internet (specific software and configurations are required to access these sites)

25
New cards

Indicators of compromise

evidence that a cyberattack is happening or has happened

26
New cards

Automated Indicator Sharing (AIS)

system that enables the sharing of attack indicators between the US government and the private sector as soon as the treat is verified

27
New cards

Structured Threat Information eXchange (STIX)

Standards to prevent cyber-attack. Developed by MITRE as a format to help distribute cyber threat intelligence. Defines methods of attack and is divided into 18 domain objects such as attack patterns, campaigns, and courses of action.

28
New cards

Trusted Automated eXchange of Indicator Information (TAXII)

an open standard that defines a set of services and message exchanges used to share information

29
New cards

Predictive Analysis

attempt to predict what attackers will do next and how to thwart their attacks

30
New cards

Threat Maps

(Threat Intelligence Sources)

provide a visual representation of active threats

31
New cards

File/code repositories

See what hackers are using to build their attacks, GitHub, private code can often be released public which is then used by hackers

32
New cards

Vendor Websites

(Research Sources)

good source for reliable information on a vendor's products. This is especially true related to any vulnerabilities and patches used to fix them.

33
New cards

Vulnerability feeds

Cybersecurity data feeds include that provide information on the latest vulnerabilities.

34
New cards

Request for Comments (RFC)

how standards and protocols are defined and published for all to see on the IETF website.