Cyber Threats (2020)

From CyberEdWiki
Jump to: navigation, search

The intent of the Cyber Threats Knowledge Unit is to provide students with basic information about the threats that may be present in the cyber realm.

Outcomes[edit]

To complete this KU, students should be able to:

  1. Identify the bad actors in cyberspace and compare and contrast their resources, capabilities/techniques, motivations and aversion to risk.
  2. Describe different types of attacks and their characteristics.

Topics[edit]

To complete this KU, you must complete all topics below, including sub-topics.

  1. Motivations and Techniques
  2. The Adversary Model (resources, capabilities, intent, motivation, risk aversion, access)
  3. Types of Attacks (and vulnerabilities that enable them)
    • Password guessing / cracking
    • Backdoors / trojans / viruses / wireless attacks
    • Sniffing / spoofing / session hijacking
    • Denial of service / distributed DOS / BOTs
    • MAC spoofing / web app attacks / 0-day exploits
    • Advanced Persistent Threat (APT)
  4. Events that indicate an attack is/has happened
  5. Attack Timing (within x minutes of being attached to the net)
  6. Attack surfaces / vectors, and trees
  7. Covert Channels
  8. Social Engineering
  9. Insider problem
  10. Threat Information Sources (e.g., CERT)
  11. Legal Issues associated with cyber threats

Skills[edit]

  1. Use resources to identify known threats and vulnerabilities.
    • National Vulnerability Database (NVD), OSVDB, vFeed.

NICE Framework Categories[edit]

Specialization Areas[edit]

See also[edit]

Related Knowledge Units

Further reading[edit]

Suggested textbooks[edit]

Suggested academic readings[edit]

Sample knowledge test[edit]

Sample skills test[edit]

Sample abilities test[edit]

Additional notes or materials[edit]

Contacts[edit]

Reference ID[edit]

CTH