Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:01
Welcome to Cyber Aires Video, Siri's and the Company of Security Plus 5 +01 Certification and Exam.
00:07
I'm your instructor Round Warner,
00:10
please visit Cyber Eri died. I t. For more information on this certification and many others.
00:16
This video is part of domain one threats, attacks and vulnerabilities.
00:22
In this video, I'll be talking about section 1.3
00:25
explained Threat Actor types and attributes.
00:30
In this video, we'll cover the following topics.
00:33
The different types of threat actors such a script kiddies, hacktivists, nation states insiders
00:40
also talk about the attributes of threat actors, internal versus external level of sophistication,
00:47
resource is and intent.
00:50
And lastly, talk about use of open source intelligence. Basically news to find out information about threats and conduct your own threat analysis.
01:02
I'll start by explaining what is a threat or threat. Actor.
01:06
Well, the definition is a potential occurrence that it can result in an undesirable outcome
01:12
where it's a person or thing likely to cause damage or danger. So threat always has a negative connotation associated with it.
01:22
A threat actor is a person or entity that is responsible for an event. Were incident that impacts our has potential to impact the safety or security of another entity.
01:34
Keep these definitions in mind as we talk about types of threat actors
01:40
under screen. You see different types of threat actors you may encounter in your role is a cyber security professional.
01:46
The first is a script kiddie, a derogatory term for people who use hacking techniques
01:53
but have limited skills. Basically, they still scripts off of the Internet, and they use them without really knowing how they work. Often, such Attackers may rely almost entirely on automated tools they download from the Internet,
02:07
so don't be a script kiddie.
02:09
The second is a hacktivist ah, person or an entity who uses hacking techniques to accomplish some activist or political goal,
02:19
usually seeking to deface websites.
02:22
Lastly, our insiders, these air internal employee seeking to cause damage to their organization.
02:30
Other type of threat actors may encounter could organized crime.
02:35
These are organized groups seeking to steal money, identities or corporate secrets, conduct espionage and organized crime signature
02:46
competitors. They're outside organization, seeking to commit corporate espionage for financial or market gain.
02:53
Nation states and the news As I'm recording this a lot about nation states attacking the United States,
03:01
their country sponsoring illegal or fraudulent activities
03:06
across the Internet.
03:08
An advanced, persistent threat or a P T.
03:13
Is an attack in which unauthorized persons gained access to a network using advanced exploitation techniques and stays there for an undetected long period of time.
03:23
The intention of an A P T attack is to steal data rather than cause damage to the network or organization.
03:30
I recommend you searched the news for a P T attacks. You'll find there are many stories you can learn from
03:38
a term associated with threats and threat. Actors are the deep Web and dark Web.
03:46
Deep Web is anything on the Internet, but a search engine can find at a normal search engine like Google being or Yahoo can't find.
03:55
The Dark Web is part of the deep Web Internet that is on Lee, accessible by special software such as tour the Onion router, allowing users and website operators to remain anonymous or untraceable.
04:12
There is a dark Web market, which is part of the dark Web, often selling illegally gotten goods. Merchandise data information were service is so if I find a zero day vulnerability, I might sell it on the dark Web market
04:29
credit card numbers that were stolen are also stolen on the dark Web. You see an example on your screen
04:35
As part of your threat analysis, you should be using open source intelligence, also known as awesome.
04:44
Open source is any information that is readily available to anyone. Newspapers, news sites.
04:50
Intelligence is the collection of information of military, political, organisational or financial value. Putting those two together basically using open websites, open new sources to create your own intelligence
05:04
websites and tools that allow you to gather information on current threats or specific security. Issues are shown on your screen
05:13
as part of this section in security. Plus, you need to also understand the attributes of threat actors.
05:20
It could be internal employees versus external entities. It all depends on their level of access.
05:29
A vendor could be someone who was external but brought in internally so they can cross.
05:36
The level of sophistication is that knowledge and entity has to cause the breach to commit the fraud.
05:44
There's also intent and motivation.
05:46
Why're they conducting the fraud? Why are they the threat that they may be
05:51
Lastly? Are those resource is or funding? Do they have the financial power to create the fraud to commit the breach
05:59
you see on your screen my definition. Based on Christie's fraud triangle, where takes resource is commit fraud. You need three things. Access, intent and knowledge.
06:11
Refer to this and think about how fraud could occur within your organization based on these attributes.
06:18
In this video, I talked about different threat actor types and attributes.
06:23
Let's practice on a sample question.
06:27
Your company's website has been just faced by an organization that doesn't agree with your corporate policies.
06:31
What type of threat actor typically does this?
06:35
The enter is be a hacktivist.
06:39
This is the definition of a hacktivist.
06:43
This concludes the video for section 1.3. Explain Threat. Actor types and attributes
06:48
refer to your study material form or information.

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor