NSE 1 The Threat Landscape - Bad Actors
What central component is necessary to form a botnet?
Command & Control (C&C) Server
What is the motivation of the "Cyber Terrorist"?
Ideology
What is the goal of the "Cyber Terrorist"?
Intimidation through disruption and damage
What is the motive of the "Cyber Criminal"?
Money
What is the motivation of the bad actor known as the "Explorer"?
Notoriety
What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?
Phishing
What are the primary motivations of the "Hacktivist"?
Political, social, or moral disagreements
What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
Ransomware
What is the primary motivation of the "Cyber Warrior"?
The political interest of their country's government
Attacking systems by exploiting unknown and unpatched vulnerabilities is also known as:
Zero-Day Exploits