Cyber Threats (2020)
The intent of the Cyber Threats Knowledge Unit is to provide students with basic information about the threats that may be present in the cyber realm.
- 1 Outcomes
- 2 Topics
- 3 Skills
- 4 NICE Framework Categories
- 5 CSEC 2017 Categories
- 6 Specialization Areas
- 7 See also
- 8 Further reading
- 9 Sample knowledge test
- 10 Sample skills test
- 11 Sample abilities test
- 12 Additional notes or materials
- 13 Contacts
- 14 Reference ID
After completing the KU, students will be able to:
- Compare and contrast the motivations and techniques of bad actors in cyberspace.
- Evaluate cyberspace threats using The Adversary Model.
- Distinguish different types of cyber attacks and their characteristics.
- Assess events that indicate an attack has happened or is currently happening.
To complete this KU, you must complete all topics below, including sub-topics.
- Motivations and Techniques
- The Adversary Model (resources, capabilities, intent, motivation, risk aversion, access)
- Types of Attacks (and vulnerabilities that enable them)
- Password guessing / cracking
- Backdoors / trojans / viruses / wireless attacks
- Sniffing / spoofing / session hijacking
- Denial of service / distributed DOS / BOTs
- MAC spoofing / web app attacks / 0-day exploits
- Advanced Persistent Threat (APT)
- Events that indicate an attack is/has happened
- Attack Timing (within x minutes of being attached to the net)
- Attack surfaces / vectors, and trees
- Covert Channels
- Social Engineering
- Insider problem
- Threat Information Sources (e.g., CERT)
- Legal Issues associated with cyber threats
- Use resources to identify known threats and vulnerabilities.
- National Vulnerability Database (NVD), OSVDB, vFeed.
NICE Framework Categories
CSEC 2017 Categories
Related Knowledge Units
Suggested academic readings
Sample knowledge test
Sample skills test
Sample abilities test
Additional notes or materials