Chapter 2: Threat Actors, Attack Vectors, and Impacts

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards
Threat Actors
an individual or entity responsible for cyber incidents against the technology equipment of enterprises and users
2
New cards
Individual Users
[Cybercrime Targets] stealing personal data to make profit
3
New cards
Enterprises
[Cybercrime Targets] stealing research/design documents of a product and selling them to customers
4
New cards
Governments
[Cybercrime Targets] spying on governments to steal defense plans or publishing secret information to embarrass them
5
New cards
Hacker
a person with high computer skills
6
New cards
Black Hat Hackers
[Hacker Types] violate computer security and may cause damage for personal gain
7
New cards
White Hat Hackers
[Hacker Types] take permission to probe an organization's system for weaknesses and report the findings
8
New cards
Gray Hat Hackers
[Hacker Types] attackers who attempt to break into a system without permission (an illegal activity) and disclose the results to cause embarrassment and push for action, not for their own advantage
9
New cards
Script kiddies
[Attacker Types] individuals who want to perform attacks yet lack technical knowledge and use freely available attack tools to carry them out.
10
New cards
Hacktivists
[Attacker Types] are strongly motivated by ideology (for the sake of their principles or beliefs). They often want to make a political statement or push for a change.
11
New cards
Insiders
[Attacker Types] often a trusted employee, contractor, or business partner who may cause damage.
12
New cards
Industrial espionage
[Attacker Types] competitors launching attacks against their opponents.
13
New cards
Criminal syndicates
[Attacker Types] groups of hackers, developers, and other tech outlaws who collaborate to perform massive crimes such as heists, blackmail, cyber terrorism, etc.
14
New cards
State actors
[Attacker Types] are sponsored by states/governments for launching cyberattacks against their enemies.
15
New cards
Attack Vector
a pathway used by a threat actor to penetrate a system
16
New cards
Email
[Attack Vectors] trick the recipient to click a malicious link or open an attachment.
17
New cards
Wireless
[Attack Vectors] data carried through airwaves can be easily intercepted in unsecured wireless networks.
18
New cards
Removable media
[Attack Vectors] USB drives can be infected with malware and intentionally given/left to users who pick them up.
19
New cards
Direct access
[Attack Vectors] physical access to computers or network devices poses the most dangerous threat. Direct access to a device makes it a lot easier to hack it than remote access.
20
New cards
Social media
[Attack Vectors] information posted on social media may help the attacker determine the right time and method of attack (e.g., when an employee is on vacation).
21
New cards

Supply chain

[Attack Vectors] a network that moves a product from the supplier to the customer and is made up of vendors, manufacturers, warehouses, distribution centers, and retailers.

22
New cards
Cloud
[Attack Vectors] as enterprises move their computing resources to remote cloud servers and storage devices, threat actors take advantage of the complexity of these systems to find security weaknesses.
23
New cards
Data loss
[Impact on Data] destroying data beyond recovery, e.g., erasing students' records from a university system.
24
New cards
Data exfiltration
[Impact on Data] stealing data to distribute it to other parties, e.g., stealing the list of customers and selling it to a competitor.
25
New cards
Data breach
[Impact on Data] stealing data to disclose without authorization, e.g., stealing account information of a social media platform and dumping it on the public internet.
26
New cards
Identity theft
[Impact on Data] taking personally identifiable information (PII) to impersonate someone, e.g., getting social security number of someone to apply for credit card under their name.
27
New cards
Availability
[Effects on Enterprise] an attack could make the system of an enterprise unavailable.
28
New cards
Reputation
[Effects on Enterprise] customers could lose trust or change their perception of the enterprise.
29
New cards
Financial loss
[Effects on Enterprise] an enterprise may have to pay for the repairs and may suffer from drop in sales & revenue due to customer loss.
30
New cards
Social engineering
is a means of gathering data by relying on the weaknesses of individuals.
31
New cards
Impersonation
[Psychological Approaches] the attacker may pretend to be an employee calling the IT support for help.
32
New cards
Redirection
[Psychological Approaches] the attacker directs a user to a fake site that looks like the original site but is filled with ads so the attacker can make money from the generated traffic (amozon.com instead of amazon.com).
33
New cards
Spam
[Psychological Approaches] the attacker sends an unsolicited email to a large number of recipients. Usually, the attacker advertises a fake or overpriced product, if few recipients respond, the profit is huge.
34
New cards
Hoax
[Psychological Approaches] the attacker sends a false warning (e.g., a malware was found in your system) and asks the user to act (delete files or change configurations).
35
New cards
Watering hole
[Psychological Approaches] the attacker targets a smaller group such as managers who visit a common website (e.g., a supplier website) and infects it with a malware that will make its way up to their computers.
36
New cards
Phishing
[Psychological Approaches] the attacker sends an email to trick the user into providing private information such as passwords, bank account numbers, etc.
37
New cards
Spear phishing
[Phishing] targets specific users.
38
New cards
Whaling
[Phishing] targets wealthy individuals or executives in higher positions.
39
New cards
Vishing
[Phishing] uses phone calls instead of emails.
40
New cards
Smishing
[Phishing] uses texting or short message services (SMS).
41
New cards
Dumpster diving
[Physical Approaches] the attacker looks in trash to find information that can be useful in an attack.
42
New cards
Tailgating
[Physical Approaches] the attacker follows an employee who is authorized to enter a building and enters directly behind them when the gate is open.
43
New cards
Shoulder surfing
[Physical Approaches] the attacker observes someone entering secret information, such as a password to log in or the PIN number on an ATM keypad.