It serves as an operating platform for many cybercrimes,
What is the Dark Web used for? allowing threat actors to organize efforts and sell products
like credit card numbers, drugs, weapons, and malware.
Observing this activity can provide insight into threat ac-
What insights can be gained from observing activities on
tor activities, future attacks, information regarding current
the Dark Web?
tactics, and evidence of previously undiscovered breaches.
The Dark Web consists of resources on the internet dis-
tributed between anonymized nodes and protected from
How is the Dark Web structured?
general access by multiple layers of encryption and rout-
ing.
Searching for vulnerabilities and threats that could impact
What does Business-Critical Asset Hunting involve?
assets.
What are some indicators of potential attacks in Busi- Unauthorized access attempts, unusual traflc patterns, or
ness-Critical Asset Hunting? suspicious activity.
A type of cyber attack that typically targets large organiza-
What is an Advanced Persistent Threat (APT)?
tions.
What is a characteristic of Advanced Persistent Threats
They remove evidence of the attack.
regarding evidence?
How do Advanced Persistent Threats typically conduct They combine many different attack elements into a care-
their attacks? fully planned and orchestrated attack.
How long can an Advanced Persistent Threat attack un-
It may unfold over several months or longer.
fold?
actor to whom the organization has identified and granted
Insider Threat
access.
Someone who uses hacker tools without necessarily un-
What is a Script Kiddie?
derstanding how they work.
What ability does a Script Kiddie lack? The ability to craft new attacks.