Information Technology /Security+ (SY0-701): Lesson 2: Compare Threat Types

Security+ (SY0-701): Lesson 2: Compare Threat Types

Information Technology73 CardsCreated about 2 months ago

This flashcard set introduces key concepts in cybersecurity risk management, including the definitions and relationships between risk, threats, and vulnerabilities. It explains how risks are assessed and categorized by internal and external threat actors, helping learners understand the foundations of security evaluation and mitigation strategies.

Define ‘Risk’

Likelihood/consequence of a threat actor exercising a vulnerability.

Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/73

Key Terms

Term
Definition

Define ‘Risk’

Likelihood/consequence of a threat actor exercising a vulnerability.

What is the reason for calculating risk?

To determine the likelihood/imapct that a successful exploit would have.

Define a ‘Vulnerability’

A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

List examples of a vulnerability

Misconfiguration of hardware/software or network device; out-of-date software/firmware; poor network architecture; inadequate policies.

What determines how vulnerable an asset is?

The value of the asset and ease of exploiting the fault.

Define a ‘Threat’

Attack vector; The potential for someone/something to exploit a vulnerability and breach security intentionally or unintentionally.

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Define ‘Risk’

Likelihood/consequence of a threat actor exercising a vulnerability.

What is the reason for calculating risk?

To determine the likelihood/imapct that a successful exploit would have.

Define a ‘Vulnerability’

A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

List examples of a vulnerability

Misconfiguration of hardware/software or network device; out-of-date software/firmware; poor network architecture; inadequate policies.

What determines how vulnerable an asset is?

The value of the asset and ease of exploiting the fault.

Define a ‘Threat’

Attack vector; The potential for someone/something to exploit a vulnerability and breach security intentionally or unintentionally.

Define an external threat actor

Has no authorized access to the target system; Infiltrates the security system using unauthorized access.

Define an internal threat actor

Was granted permissions on the system; Typically an employee, contractors or business partners.

What are general motivations for perpetrating a cyber attack?

Greed/Financial, Curiosity/Chaos, Grievance/Revenge, Political

List 3 general strategies/method threat actors use to perpetrate a cyber attack

  1. Service Disruption

  2. Data exfiltration

  3. Disinformation

Define ‘Service Disruption’

Type of attack that compromises the availability of an asset or business process.

Define ‘Data Exfiltration’

Process by which an attacker takes data stored in a private network and moves it to an external network without authorization.

Define ‘Disinformation’

Type of attack that falsifies an information resource that is normally trusted by others.

List examples of a disinformation attack

Changing the content of a website; Manipulating search engines to inject fake sites; Using bots to post false information to social media sites.

Define a ‘Hacktivist’

Threat actor motivated by a social issue or political cause.

Define an advanced persistent threat (APT)

Ability of an adversary to achieve ongoing compromise of network security (obtaining and maintaining access).

Define a ‘Nation-state actor’

Threat actor that is supported by the resources of its host country’s military and security services.

What are the typical targets of nation-state actors?

Energy, health, and electoral systems/organizations.

What are the typical goals of nation-state actors?

Primarily disinformation and espionage for strategic advantage - typically not for financial reason.

What is ‘Shadow IT’?

Computer hardware, software, or services used on a private network without authorization from the system owner.

What are the typical motivations/goals of an internal/insider threat actor?

Revenge and Financial gain.

Which three types of threat actor are most likely to have high levels of funding?

State actors, organized crime, and competitors.

Define an ‘Attack Surface’

All the points at which a malicious threat actor could try to exploit a vulnerability.

What are examples of what could be apart of an attack surface?

Any location or method where a threat actor can interact with a network port, application, computer, or user.

Define the process of minimizing attack surface

Restricting access so that only trusted endpoints, protocols/ports, and services are permitted.

Define a 'Threat Vector'

A specific path a threat actor uses to gain unauthorized access to a system.

Define 'Vulnerable software'

Contains a flaw in its code or design that can be exploited to circumvent access control or to crash the process.

Define an 'Unsupported System/Application'

System/Application whose vendor no longer develops updates and patches for the product.

What are the two vectors a software vulnerability is exploited?

  1. Remote

  2. Local

Define a 'Remote' exploit

An exploit performed by sending code to the target over a network and does not depend on an authenticated session with the target to execute.

Define a 'Local' exploit

The exploit code must be executed from an authenticated session on the computer; Threat actor needs to use some valid credentials or hijack an existing session to execute it.

Define an 'Unsecure Network'

One that lacks the attributes of confidentiality, integrity, and availability.

What constitutes an unsecure network?

Unnecessary open ports, weak/no authentication, use of default credentials, or lack of secure communications/encryption.

What is the outcome from a 'Lack of Confidentiality'

Allows threat actors to snoop on network traffic and recover passwords or other sensitive information.

What is the outcome from a 'Lack of Integrity'

Allows threat actors to use unauthorized devices to manipulate traffic/data, run exploit code, or spoof a service.

Define a 'Lack of Availability'

Threat actors are able to perform service disruption attacks; aka denial of service (DoS) attacks.

What are qualities of a secure network?

Uses an access control framework and cryptographic to identify, authenticate, authorize, and audit network users, hosts, and traffic.

Define a 'Direct Access' threat vector

Threat actor uses physical access to the site to perpetrate an attack; Unlocked workstation, boot disk to install malicious tool, stealing a PC/disk drive.

Define a 'Wired Network' threat vector

Threat actor accesses a site to attach an unauthorized device to a physical network port.

Define a 'Remote and Wireless Network' threat vector

Attacker obtains credentials for remote access or wireless connection to the network or cracks the security protocols used for authentication; Rouge/spoofed APs/Evil Twin APs

Define a 'Cloud Access' threat vector

Gaining access to a cloud system through an account/service/hose with weak configuration; Potentially attacking a cloud service provider.

Define a 'Bluetooth Network' threat vector

Threat actor exploits a vulnerability or misconfiguration to transmit a malicious file to a user's device over Bluetooth.

Define a 'Default Credentials' threat vector

Attacker gains control of a network device or app because it has been left configured with a default password.

Define a 'Open Service Port' threat vector

Threat actor is able to establish an unauthenticated connection to a logical TCP or UDP network port.

Define a 'Lure' threat vector

Entices a victim into interacting with a removable device, file, image, or program that conceals malware.

What is the purpose of a lure attack?

If the threat actor cannot gain access to run a remote or local exploit directly, a lure might trick a user into facilitating the attack.

How are lure attacks prevented?

Vulnerability management, antivirus, program execution control, and intrusion detection.

What is the typical attack vector used to deliver a lure attack?

Any form of direct messaging; Email, SMS, Instant Messaging (iMessage), Websites/Social Media

Define a 'Supply chain'

End-to-end process of supplying, manufacturing, distributing/providing goods and services to a customer.

Define 'procurement management'

Process of ensuring reliable sources of equipment and software

Define a 'Supplier' in a supply chain

Obtains products directly from a manufacturer to sell in bulk to other businesses; Referred to as business to business (B2B).

Define a 'Vendor'

Obtains products from suppliers to sell to retail businesses (B2B) or directly to customers (B2C); Might add some level of customization and direct support for the product(s).

Define a 'Business Partner'

Implies a closer relationship where two companies share quite closely aligned goals and marketing opportunities.

Define a 'managed service provider' (MSP)

Provisions and supports IT resources such as networks, security, or web infrastructure.

What is the downside of using a managed service provider (MSP)?

Difficult to monitor the MSP; The MSP's employees are all potential sources of insider threat.

What nmap option performs a scan that displays service identification?

-sV

What are two primary response options to the discovery of an open port hosting an insecure service?

Close the exposed port and configure service encryption if its a necessary service.

Define 'Social engineering'

Hacking the human; Goal is to deceive unsuspecting users into providing sensitive data or violating security guidelines in preparation for an intrusion or to effect an actual intrusion.

Define 'Impersonation'

Social engineering attack where an attacker pretends to be someone they are not.

What are the two types of impersonation attacks?

  1. Persuasion/liking

  2. Coercion/threat/urgency

Define 'Pretexting'

Social engineering tactic communicating a lie or half-truth in order to get someone to trick a victim; Combination of persuasion and coercion.

Define 'Phishing'

Email/SMS based attack that persuades the target into interacting with a malicious resource or providing sensitive data disguised as a trusted source.

What two attack methods combine to create phishing?

A combination of social engineering and spoofing.

Define 'Vishing'

A human-based attack where the attacker extracts information over the phone or VoIP.

Define 'Pharming'

Impersonation attack that corrupts the name resolution process and redirects users from a legitimate website to a malicious one.

What do phishing and pharming both depend on?

Impersonation and spoofing.

Define 'Typosquatting'

Attacker registers a domain name with a common misspelling of an existing domain, so a user who misspells a URL into a browser is taken to the attacker's website.

Define 'Business email compromise'

Impersonation attack where the attacker gains control of an employee's account and uses it to convince other employees to perform fraudulent actions.

Define 'Brand impersonation'

Threat actor accurately duplicates a company's logos and formatting to make a phishing message or pharming website a compelling fake.

Define 'Disinformation'

Refers to a purposeful motivation to deceive.


Define 'Misinformatoin'

Refers to repeating false claims or rumors without the intention to deceive.

Define a 'watering hole attack'

Attacker targets specific groups or organizations, discovers which websites they frequent, and injects malicious code into those sites to infect the targets once they interact with the resource.

Define a 'Whaling' attack

Spear-phishing attack directed at high-level executives where attackers masquerade as legitimate, known and trusted entities and encourage a victim to share highly sensitive information or to send a wire transfer to a fraudulent account.