Overview of Threats and Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Name some examples of threats:

  • Individuals

  • Insider threats

  • organized crime

  • hacktivist groups

  • terrorists

  • nation states

  • industrial espionage

2
New cards

Threats have varying levels of what?

Skill, access, and resources

3
New cards

Skill

Adversary’s technical expertise and understanding

4
New cards

Access

How closely the adversary is associated with the target

5
New cards

Resources

Refer to the funding, time, technology, etc. at the adversary’s disposal

6
New cards

Threats vary in their level of ___ and ___

structure and complexity

7
New cards

Unstructured threats

Individuals or loosely affiliated groups with low level of experience and or resources

They may be unaware of what exactly they are attacking, or how the attack actually works

8
New cards

What are script kiddies?

Novice hackers who rely on existing software for cyberattacks, which are simple and widely recognized

9
New cards

Unstructured threats choose targets based on ___

opportunity

10
New cards

Structured Threats

  • Well-funded, coordinated groups of attackers

  • May have access to experienced individuals, insider connections, or government support

  • Organized crime, major hacktivist groups, and nation states may fall into this categroy

  • attacks are more sophisticated; they tend to have specific goals and targets, with attacks based on newly-discovered exploits or vulnerabilities

11
New cards

When modelling a threat, it is important to keep in mind the adversary’s ___ and ___

goals and capabilities

12
New cards

Goals

  • Why might the adversary attack the system

  • what resources do they have

  • what level of access do they have to our system

13
New cards

Capabilities

  • How structured is the adversary

  • what resources do they have

  • what level of access do they have to our system

14
New cards

Attacks can be ___ or ___

active or passive

15
New cards

Active attacks

  • involves directly interfering with the system, such as obstructing access to a resource or modifying data

    • They are more over and will be quickly noticed, producing observable consequences

    • They are more likely to affect integrity and availability since they cannot be easily violated through passive means

16
New cards

Passive Attacks

  • involves monitoring communications, gaining information about system resources, employees, etc.,. without directly interfering with the system

    • They are more covert and may go unnoticed as they might produce no observable consequences

    • More likely to affect confidentiality as they focus on gathering information

17
New cards

Zero-Day Attacks

Rely on unknown vulnerabilities that have yet to be mitigated or exploited

18
New cards

When is a threat no longer considered a zero-day attack?

Once a threat is successfully discovered and patched

19
New cards

Attack Surface

  • collection of all possible areas of a target where an attack might occur

    • This may include software, hardware, physical controls, and people

20
New cards

Attack Tree

  • represents the goals and subgoals of an attack as nodes in a tree

    • it is similar to a decision chart, showing the different paths that an attack might take and what steps are necessary for those attacks to succeed

    • will be informed by the attack surface