Chapter 2 cyber security threat landscape

studied byStudied by 0 people
0.0(0)
get a hint
hint

cyber security threats 

1 / 22

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

Studying Progress

New cards
23
Still learning
0
Almost done
0
Mastered
0
23 Terms
0
New cards

cyber security threats 

  1. Internal vs external 

  1. Level of sophistication/capability 

  1. Resources/funding 

  1. intent/ motivation 

New cards
1
New cards
  1. White-hat Hackers

  1. Black-hat hackers

  1. Gray-hat Hackers

  1. authorized, seeking to discover security vulnerabilities  

  2. unauthorized, those with malicious intent 

  3. unauthorized, those who fall in between but inform target of vulnerabilities  

New cards
2
New cards

Threat actors (6 different types)

  1. Script kiddies

  2. Hacktivists

  3. Criminal syndicates 

  4. Advanced persistent Threats (ATPs)

  5. Insiders

  6. Competitors

New cards
3
New cards

Zero Day attacks

conduct their own security vulnerability research that is not known to other attackers or teams, store this info for later use  

New cards
4
New cards

shadow IT

seek out their own tech solutions that is not approved by the organization  

New cards
5
New cards

what is a Threat Vector?

Means used by threat actors to gain access

New cards
6
New cards

6 examples of Threat vectors

  1. Email and social media- most commonly exploited 

  1. Direct Access- through network of physically entering facilities  

  1. Wireless Networks 

  1. Removable media- USB drives to spread malware to launch attack 

  1. Cloud 

  2. Third-party risk-interfere with an organizations IT supply chain (when device is in transit) 

New cards
7
New cards

Threat data and intelligence

activities and resources for CS professionals seeking to learn about changes in threat environment 

New cards
8
New cards

Predictive analysis

to identify likely risks to the organization 

New cards
9
New cards

Open-source intelligence (OSINT)

gather intelligence from publicly available sources to commercial services  

New cards
10
New cards

Closed source/Proprietary intelligence

inside based info gathering, research and use of custom tools (threat feed) 

New cards
11
New cards

Threat maps

provide a geographic view of threat intelligence 

New cards
12
New cards

Vulnerability databases

insight into the types of exploits that can be used against an organization 

New cards
13
New cards

Assessing Threat intelligence 

  1. Is the information timely? 

  1. Is it accurate? 

  1. Is it relevant? 

New cards
14
New cards

confidence score

summarizing the threat intelligence assessment data 

New cards
15
New cards

Threat indicator management and exchange 

structured Threat information eXpression (STIX)- XML language originally sponsored by the US department of homeland security. Current version: STIX 2.0 

New cards
16
New cards

Public and Private Information Sharing Centers 

ISAC’s) help infrastructure owners and operators share treat info and provide tools and assistance to their members 

New cards
17
New cards

Script kiddies

those who use hacking techniques but have limited skills 

New cards
18
New cards

Hacktivists

use of a variety of techniques, skills and resources to achieve a goal

New cards
19
New cards

Criminal Syndicates

appear where money is to be made

New cards
20
New cards

Advanced persistent Threats (ATPs)

focused on foreign gov or corporations, patient, well funded

New cards
21
New cards

insider threat actor

employee, contractor or vendor

New cards
22
New cards

Competitor threat actor

use stolen information for the use in its own business advantages

New cards

Explore top notes

note Note
studied byStudied by 186 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 24 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 53 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
4.0 Stars(3)
note Note
studied byStudied by 38 people
Updated ... ago
4.0 Stars(3)
note Note
studied byStudied by 46 people
Updated ... ago
5.0 Stars(3)

Explore top flashcards

flashcards Flashcard30 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(4)
flashcards Flashcard94 terms
studied byStudied by 160 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard40 terms
studied byStudied by 132 people
Updated ... ago
4.3 Stars(7)