Chapter 2 cyber security threat landscape

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:24 PM on 10/2/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

23 Terms

1
New cards

cyber security threats 

  1. Internal vs external 

  1. Level of sophistication/capability 

  1. Resources/funding 

  1. intent/ motivation 

2
New cards
  1. White-hat Hackers

  1. Black-hat hackers

  1. Gray-hat Hackers

  1. authorized, seeking to discover security vulnerabilities  

  2. unauthorized, those with malicious intent 

  3. unauthorized, those who fall in between but inform target of vulnerabilities  

3
New cards

Threat actors (6 different types)

  1. Script kiddies

  2. Hacktivists

  3. Criminal syndicates 

  4. Advanced persistent Threats (ATPs)

  5. Insiders

  6. Competitors

4
New cards

Zero Day attacks

conduct their own security vulnerability research that is not known to other attackers or teams, store this info for later use  

5
New cards

shadow IT

seek out their own tech solutions that is not approved by the organization  

6
New cards

what is a Threat Vector?

Means used by threat actors to gain access

7
New cards

6 examples of Threat vectors

  1. Email and social media- most commonly exploited 

  1. Direct Access- through network of physically entering facilities  

  1. Wireless Networks 

  1. Removable media- USB drives to spread malware to launch attack 

  1. Cloud 

  2. Third-party risk-interfere with an organizations IT supply chain (when device is in transit) 

8
New cards

Threat data and intelligence

activities and resources for CS professionals seeking to learn about changes in threat environment 

9
New cards

Predictive analysis

to identify likely risks to the organization 

10
New cards

Open-source intelligence (OSINT)

gather intelligence from publicly available sources to commercial services  

11
New cards

Closed source/Proprietary intelligence

inside based info gathering, research and use of custom tools (threat feed) 

12
New cards

Threat maps

provide a geographic view of threat intelligence 

13
New cards

Vulnerability databases

insight into the types of exploits that can be used against an organization 

14
New cards

Assessing Threat intelligence 

  1. Is the information timely? 

  1. Is it accurate? 

  1. Is it relevant? 

15
New cards

confidence score

summarizing the threat intelligence assessment data 

16
New cards

Threat indicator management and exchange 

structured Threat information eXpression (STIX)- XML language originally sponsored by the US department of homeland security. Current version: STIX 2.0 

17
New cards

Public and Private Information Sharing Centers 

ISAC’s) help infrastructure owners and operators share treat info and provide tools and assistance to their members 

18
New cards

Script kiddies

those who use hacking techniques but have limited skills 

19
New cards

Hacktivists

use of a variety of techniques, skills and resources to achieve a goal

20
New cards

Criminal Syndicates

appear where money is to be made

21
New cards

Advanced persistent Threats (ATPs)

focused on foreign gov or corporations, patient, well funded

22
New cards

insider threat actor

employee, contractor or vendor

23
New cards

Competitor threat actor

use stolen information for the use in its own business advantages

Explore top notes

note
Chemical bonds
Updated 974d ago
0.0(0)
note
History of England
Updated 1275d ago
0.0(0)
note
Indirect Values
Updated 1499d ago
0.0(0)
note
Chemistry of Life, Biology
Updated 1769d ago
0.0(0)
note
Photons
Updated 899d ago
0.0(0)
note
Biology - Evolution
Updated 1476d ago
0.0(0)
note
Chemical bonds
Updated 974d ago
0.0(0)
note
History of England
Updated 1275d ago
0.0(0)
note
Indirect Values
Updated 1499d ago
0.0(0)
note
Chemistry of Life, Biology
Updated 1769d ago
0.0(0)
note
Photons
Updated 899d ago
0.0(0)
note
Biology - Evolution
Updated 1476d ago
0.0(0)

Explore top flashcards

flashcards
faf
40
Updated 956d ago
0.0(0)
flashcards
faf
40
Updated 956d ago
0.0(0)