Cyber Threats (2020)
The intent of the Cyber Threats Knowledge Unit is to provide students with basic information about the threats that may be present in the cyber realm.
To complete this KU, students should be able to:
- Identify the bad actors in cyberspace and compare and contrast their resources, capabilities/techniques, motivations and aversion to risk.
- Describe different types of attacks and their characteristics.
To complete this KU, you must complete all topics below, including sub-topics.
- Motivations and Techniques
- The Adversary Model (resources, capabilities, intent, motivation, risk aversion, access)
- Types of Attacks (and vulnerabilities that enable them)
- Password guessing / cracking
- Backdoors / trojans / viruses / wireless attacks
- Sniffing / spoofing / session hijacking
- Denial of service / distributed DOS / BOTs
- MAC spoofing / web app attacks / 0-day exploits
- Advanced Persistent Threat (APT)
- Events that indicate an attack is/has happened
- Attack Timing (within x minutes of being attached to the net)
- Attack surfaces / vectors, and trees
- Covert Channels
- Social Engineering
- Insider problem
- Threat Information Sources (e.g., CERT)
- Legal Issues associated with cyber threats
- Use resources to identify known threats and vulnerabilities.
- National Vulnerability Database (NVD), OSVDB, vFeed.
NICE Framework Categories
Related Knowledge Units
Suggested academic readings
Sample knowledge test
Sample skills test
Sample abilities test
Additional notes or materials