CompTIA Security+ Exam SY0-701 Lesson 2 Comparing Threat Types PDF

Document Details

EndearingMinotaur8631

Uploaded by EndearingMinotaur8631

2023

CompTIA

Tags

cybersecurity threat analysis security threats information security

Summary

This document is a lesson on threat types, covering topics such as threat actors, attack surfaces, and various vectors. It's valuable for understanding and classifying security vulnerabilities.

Full Transcript

CompTIA Security+ Exam SY0-701 Lesson 2 Comparing Threat Types Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org 1 Objectives Compare and contrast attributes and motivations of threat act...

CompTIA Security+ Exam SY0-701 Lesson 2 Comparing Threat Types Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org 1 Objectives Compare and contrast attributes and motivations of threat actor types Explain common threat vectors and attack surfaces 2 Lesson 2 Topic 2A Threat Actors Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org 3 Vulnerability, Threat, and Risk​ 4 Attributes of Threat Actors​ Known threats versus adversary behaviors​ Internal/external​ Internal threats have authorized access already Attribute of threat actor, not where attack takes place Level of sophistication/capability​ Low capability actors rely on commodity tools​ High capability actors can develop new attacks Access to political or military assets Resources/funding​ 5 Motivations of Threat Actors Intent/motivation​ Maliciously targeted versus opportunistic​ Accidental/unintentional​ Strategies Service disruption, data exfiltration, and disinformation Chaotic motivations Financial motivations Blackmail, extortion, and fraud Political motivations Whistleblowers, campaign groups, nation-state actors 6 Hackers and Hacktivists The “Lone Hacker”​ White hats versus black hats Authorized versus non-authorized Unskilled attackers “Script kiddies​” Hacker teams and hacktivists​ 7 Nation-state Actors and Advanced Persistent Threats​ Attached to military/secret services High level of capability​ Advanced Persistent Threat (APT)​ Espionage and strategic advantage​ Deniability​ False flag operations​ Screenshot © 2023 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. 8 Organized Crime and Competitors Organized crime Operate across legal jurisdictions​ Motivated by criminal profit​ Can be very well resourced and funded​ Competitors​ Cyber espionage​ and disinformation Combine with insider threat​ 9 Internal Threat Actors​ Malicious internal threat​ Has or has had authorized access​ Employees, contractors, partners​ Sabotage, financial gain, business advantage​ Unintentional insider threat​ Weak policies and procedures​ Weak adherence to policies and procedures​ Lack of training/security awareness​ Shadow IT​ 10 Review Activity: Threat Actors Vulnerability, threat, and risk​ Attributes of threat actors​ Internal/external, level of sophistication/capability, resources/funding Motivations of threat actors Service disruption, data exfiltration, disinformation Chaotic, financial, political Hackers and hacktivists Nation-state actors and advanced persistent threats​ Organized crime and competitors Internal threat actors​ 11 Lesson 2 Topic 2B Attack Surface Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org 12 Attack Surface and Vectors​ Attack surface​ Points where an attacker can discover/exploit vulnerabilities Physical, network, application​, and human surfaces Whole organization or single system/app scope Threat vectors​ High capability actors can expand attack surface by developing novel vectors 13 Vulnerable Software Vectors Vulnerable software Faults in code or design Delays and difficulties in patching Unsupported systems and applications Client-based vs. agentless Characteristic of automated vulnerability scanners 14 Network Vectors Remote versus local exploit techniques Unsecure networks Lack of confidentiality, integrity, availability Specific vectors Direct access and wired (physical ports) Remote, wireless, cloud, and Bluetooth Default credentials Open service port (TCP and UDP ports) 15 Lure-based Vectors Bait that will tempt the target into opening it Removable device Drop attack Executable file Trojan Horse malware Document files Macro and scripting technologies Image files Viewer/browser vulnerabilities 16 Message-based Vectors Email Short Message Service (SMS) Instant messaging (IM) Web and social media Voice calls 17 Supply Chain Attack Surface End-to-end process of designing, manufacturing, and distributing goods and services to a customer Procurement management Suppliers, vendors, and business partners Whole supply chain can be highly complex Deny threat actors opportunity, time, and resources Managed service providers (MSPs) 18 Review Activity: Attack Surface Attack surface and vectors​ Vulnerable software Network vectors Remote versus local Direct access, wired, remote/wireless, cloud, Bluetooth, default credentials, open ports Lure-based vectors Devices, programs, documents, images Message-based vectors Email, SMS, IM, web/social media Supply chain attack surface Design, manufacture, distribution 19 Lab Activity Assisted Lab: Finding Open Service Ports 20 Lesson 2 Topic 2C Social Engineering Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org 21 Human Vectors “Hacking the human”​ Purposes of social engineering​ Reconnaissance and eliciting information​ Intrusion and gaining unauthorized access​ Many possible scenarios​ Persuade a user to run a malicious file​ Contact a help desk and solicit information​ Gain access to premises and install a monitoring device​ 22 Impersonation and Pretexting​ Impersonation​ means pretending to be someone else​ Persuasiveness/consensus/liking approach Coercion/threat/urgency approach Pretexting​ Exploit situations where identity- proofing is difficult​ Using a scenario with convincing additional detail​ Obtain or spoof data that supports the identity claim​ 23 Phishing and Pharming Phishing Trick target into using a malicious resource​ Spoof legitimate communications and sites​ Vishing​ Using a voice channel​ SMiShing​ Using text messaging​​ Passive techniques have less risk of detection​ Pharming​ Redirection by DNS spoofing​ 24 Typosquatting​ Make phishing messages more convincing​ Email spoofing techniques From field confusion Typosquatting Cousin domains that look like a trusted domain 25 Business Email Compromise Target phishing/vishing/SMiShing to a specific individual Pose as colleague, business partner, or vendor Spear phishing, whaling, CEO fraud, angler phishing, … Brand impersonation and disinformation Make convincing fake phishing messages, business correspondence, and pharming websites Disinformation versus misinformation Watering hole attack Compromise a third-party site that the threat actor knows is used by the target 26 Review Activity: Social Engineering Social engineering Human vectors Impersonation and pretexting​ Phishing and pharming Typosquatting​ Business email compromise 27 Lab Activity Assisted Lab: Using SET to Perform Social Engineering 28 CompTIA Security+ Exam SY0-701 Lesson 2 Summary Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org 29

Use Quizgecko on...
Browser
Browser