Threat Actors: Who Are the Attackers?
| Threat Actor | Motivation | Traits | Examples | 
|---|
| Nation-State Hackers | Espionage, cyber warfare | Highly skilled, stealthy, well-funded | Fancy Bear (Russia), APT Groups | 
| Organized Crime Groups | Financial gain (ransomware, theft) | Professional, use Ransomware-as-a-Service | Conti ransomware gang | 
| Hacktivists | Ideological or political disruption | Varied skill levels | Anonymous | 
| Insider Threats | Revenge, profit, carelessness | Already have access, dangerous | Disgruntled employees stealing data | 
| Script Kiddies | Fun, curiosity, fame | Unskilled, use pre-made hacking tools | Individuals using automated exploit kits | 
| Shadow IT | Convenience, speed | Employees using unauthorized tech | Unapproved cloud apps in a workplace | 
Threat Vectors: How Attacks Occur
| Threat Vector | How It Works | Examples | 
|---|
| Message-Based Attacks | Phishing emails, SMS scams, fake calls | Malicious emails trick users into revealing credentials | 
| File-Based Attacks | Malware hidden in PDFs, executables | Infected attachments in emails | 
| Web-Based Attacks | Drive-by downloads, fake websites | Visiting a compromised site installs malware | 
| Removable Media Attacks | Infected USBs, rogue devices | Plugging in a USB auto-installs a keylogger | 
| Supply Chain Attacks | Compromised vendor software/hardware | Backdoor injected into a trusted software update | 
| Network Attacks | Eavesdropping, Man-in-the-Middle (MITM) | Hackers intercept unencrypted Wi-Fi communications | 
Tip: Attackers often combine vectors for maximum impact (e.g., Phishing → Malware Download → Remote Access).
Common Vulnerabilities: Identifying Weak Spots
| Vulnerability Category | Examples | How It’s Exploited | 
|---|
| Application Vulnerabilities | SQL Injection, Cross-Site Scripting (XSS), Buffer Overflows | Injecting malicious input into web forms | 
| Operating System (OS) Vulnerabilities | Unpatched software, privilege escalation flaws | Exploiting outdated system configurations | 
| Hardware/Firmware Weaknesses | Default passwords, unpatched firmware | Using factory-set credentials to gain access | 
| Cloud/Virtualization Weaknesses | Misconfigured storage, VM escape | Public cloud storage exposes sensitive data | 
| Configuration Issues | Open ports, weak firewall rules | Attackers find unsecured services to exploit | 
| Zero-Day Vulnerabilities | Newly discovered flaws with no patch yet | Hackers attack before vendors release security fixes | 
Tip: If an exam scenario mentions poor configurations, unpatched systems, or weak security settings, it’s likely a vulnerability issue.
Indicators of Malicious Activity: Spotting an Attack
| Indicator | Possible Attack | 
|---|
| Unusual Outbound Traffic | Data exfiltration or malware communication | 
| High CPU/Memory Usage | Cryptomining malware or excessive bot activity | 
| Unknown Running Processes | Malware persistence in the system | 
| Strange Account Behavior | Account compromise, credential theft | 
| Disabled Security Tools | Rootkits, insider sabotage | 
| Unauthorized Configuration Changes | Privilege escalation or tampering | 
Tip: Exam scenarios will often require recognizing an attack based on its symptoms in logs or system behavior.
Malware Types and Attack Techniques
| Malware Type | How It Works | 
|---|
| Virus | Attaches to files and spreads when opened | 
| Worm | Self-replicates across networks automatically | 
| Trojan Horse | Disguises as legitimate software to install malware | 
| Ransomware | Encrypts files and demands payment | 
| Rootkit | Hides deep in the system to evade detection | 
| Spyware | Secretly collects user data | 
| Logic Bomb | Activates malicious code when triggered | 
| Keylogger | Records keystrokes to steal passwords | 
| Attack Technique | What It Does | 
|---|
| DDoS Attack | Floods a network or service to make it crash | 
| DNS Poisoning | Redirects users to fraudulent websites | 
| ARP Poisoning | Manipulates network traffic flow | 
| Brute Force Attack | Repeatedly guesses passwords until one works | 
| Dictionary Attack | Uses pre-defined wordlists to crack passwords | 
| Password Spraying | Tries common passwords across many accounts | 
Defense Strategies: Preventing Cyber Attacks
| Mitigation Strategy | How It Helps | 
|---|
| Network Segmentation | Limits malware spread within different zones | 
| Access Control Lists (ACLs) | Restricts network traffic based on rules | 
| Patch Management | Fixes security vulnerabilities with updates | 
| Application Allowlisting | Prevents unauthorized programs from running | 
| Isolation & Sandboxing | Limits risk by executing suspicious files separately | 
| Encryption | Protects sensitive data at rest and in transit | 
| Monitoring & Detection (SIEM, IDS/IPS) | Detects security threats in real-time | 
| Least Privilege Enforcement | Restricts user access to only essential permissions | 
| Configuration Management | Keeps security settings standardized | 
| Incident Response Planning | Enables fast action in case of breaches |