Cyber Threat Landscape
This chapter will cover the cyber threat landscape, ranging from the possible attack vectors used by attackers to the type of attackers there are
Different Hats
Different Hats
Grey hat : unauthorized with good intent
Black hat: unauthorized with malicious intent
White hat: authorized
Green Hat: uses skills that professional hackers may have overlooked to exploit weaknesses
Threat Actors
Threat Actors:
Hacktivist
Script kiddies
Nation state
Advance persistent threats
Insiders
Terrorists
Criminal syndicates
Competitors
Attack Vectors
Email and Social Media
A lot of information can be scraped from social media
emails are a key part of phishing attacks and are very common
Direct Access
An attacker may try to get access to the network by physically connecting to it on site or using an unmanned computer terminal
Wireless Networks
An attacker can sit in the car park and try to access the wifi network if its unsecure its an easy way in
Removable Media
An attacker may scatter Usbs in the car park loaded with malware , the intent is for an employee to plug it into their work laptop and spread the malware
Cloud
Cloud services can be used as an attack vector, attackers routinely scan popular cloud services for files with unconfigure access controls, systems which have security flaws, or accidently published api keys and passwords
Third Party
An attacker may attempt to tamper with an organisations IT supply chain and load back doors onto the devices before the end user receives the device
This should be monitored heavily regarding outside code development, cloud data storage and integration between internal and external systems