Threat Vectors & Motives

Canadian Incidents

Tech & Trends
Cyber Hygiene & Defense
100

These threat actors are primarily motivated by profit and financial gain.

Who are Cybercriminals

100

In December 2022, this Toronto hospital was attacked by LockBit, who later apologized and offered a free decryptor.

What is SickKids (The Hospital for Sick Children)

100

This term refers to any device connected to a network, such as a laptop, smartphone, or smart thermostat.

What is an Endpoint

100

To protect networks and devices, the checklist suggests using antivirus, anti-malware, and these barriers to block threats.

What are Firewalls

200

This specific type of threat actor is motivated by ideological reasons rather than money or geopolitics.

Who are Hacktivists

200

In 2014, the National Research Council suffered a state-sponsored breach attributed to this country.

What is China

200

This type of "engineering" involves tricking unwitting insiders into putting malware onto their systems, often via phishing.

What is Social Engineering

200

For access control, it is recommended to use this security measure for all accounts, not just admin ones.

What is Multi-Factor Authentication (MFA)

300

LockBit operates using this specific business model, which allows "affiliates" to use their malware in attacks.

What is Ransomware-as-a-Service (RaaS)

300

The 2023 attack on Hydro-Québec, attributed to a pro-Russian group, utilized this specific type of attack vector to take down their website.

What is a DDoS (Distributed Denial of Service) attack

300

This protective physical separation is used to completely isolate a secure network from unsecured external networks.

What is an "Air Gap"

300

This access control concept ensures users have only the minimum access necessary to do their jobs.

What is the Principle of Least Privilege

400

This term describes someone within an organization who, either wittingly or unwittingly, installs malware onto a device.

What is an Insider (or Insider Threat)

400

The 2020 attack on Trans-Northern Pipelines was carried out by this ransomware group, which also hit the Colonial Pipeline in the U.S.

Who is DarkSide

400

Guidelines for defending critical infrastructure play a central role in recommending this specific management practice to prevent attackers from gaining access to critical resources.

What is Privileged Access Management

400

Organizations with remote workers are strongly advised to use this tool to ensure secure remote connections.

What is a VPN (Virtual Private Network)

500

While thrill-seekers are motivated by satisfaction, this type of threat actor is motivated specifically by "Geopolitical" factors.

Who are Nation-states

500

According to the presentation, the 2024 Ontario Healthcare ransomware attacks were caused by this specific endpoint failure

What are Compromised Employee Credentials (or Compromised Administrative Accounts)

500

Digital transformation and the rise of IoT have expanded this conceptual "area," which encompasses all systems and services that can be exploited by malicious actors.

What is the Cyber Threat Surface (or Attack Surface)

500

This is the maximum window, in hours, to report a cyber security incident to the CSE under the proposed Critical Cyber Systems Protection Act (CCSPA).

 What is 72 Hours

M
e
n
u