Threat Actor Types and Attributes

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

33 hours 23 minutes
Video Transcription
Hello and welcome back to Siberia. 2019 comp T A Security plus certification preparation course.
This is a continuation of modern number one and the top of discussion. In fact, the topic is domain one.
We take a look at threats, attacks and bone abilities.
Here, again is a brand new objective, which encompasses dis particular, remain
in its title, explained threat actor types and attributes
before we begin the price, actually explaining what the threat actor types and after, Let's take a look at a pre assessment quiz
and the question is as follows.
A script kiddie can best be described as an individual who uses scripts, all software written by someone else to explore a break into a computer system.
Is that true or false?
If you said that the two you're absolutely correct
here again is, as we mentioned earlier, this is a brain to objectively just tied explain threat at the types and attributes here again are the topics of discussion, which encompasses this particular known objective, ranging from your skip kitty all way down to your competitors.
So, without further, let's begin, the process of finding exactly a well is describing what is a threat actor as well as the different categories. Now, when you think about a threat actor, they also call a malicious actor. It's an indie that is partially a worley, responsible for an incident that can impact or have the potential
to impact your organizational security.
So again, a threat actor malicious actor is a person, or any of that is responsible for event or incident. That impact it has the potential impact, your safety or security off another entity.
In other words, you have a competitive. You have the script, kiddies. You have hacktivists, organized crime nation, states, AP teas as well as your insiders. So without further ado, let's begin by First of all, define exactly what is a skip
kitty. In other words, script. Kiddie.
Now, when you think about a script kiddie,
it can best be described as an individual who uses scripts of software written by someone else to explore or break into a computer system.
Then this type of person does not have the high technical knowledge. However, they able to use scripts and code that here she finds to make an attack against your particular organization,
Then we have the hacktivists.
Now this is an external threat based on what they do. They deface your website or break into your computer or network. They are politically motivated.
Then we have organized crime. Now, opposite organized crime basically is a category of transnational, national or local grouping off highly centralized enterprise run by criminals who intend to engage in illegal activity, most commonly for profit.
Then we have the nation state or a PT's or advanced persistent threat, this external threat that tries to steal data from your network. But they are there for an extremely long period of time.
Then we have our insider's insider threat is a disgruntled employee
who might have been been overlooked for promotion, and their relation with their company has opposite gone sour.
Then we have our competitors.
A computer is another continent in the same energy as you're coming. Who tries to gain information on your own for hours on your new products and hopes that it can build it fast and get it to market before you do
Here again are some additional again. Topping discussion was incompetent. Explain the threat actor types and attributes. We could begin by first taking a look again at the actual actor. Would it be internal, external looking, a little sophistication,
resource or funding as well, intent and motivation?
So we look at cyber threats and cyber threat actors
here. In this particular slide, we see cyber threat actors and we see their motivation, for example, nation, state geopolitical, your cyber criminal. They're looking for profit,
hacktivists, again, ideology, ideology. Other words you have your terrorist group with again. They there, in terms of then looking at that, focuses on violence.
The ideology
drill secrets again. It looked with satisfaction. Then you have the inside of office time. These are individuals or discontented. In other words,
so moving on this particular presentation,
let's take a look at some of the attributes of the actors. First of all,
it could be internal external threats. Give me internal or external to the organisation or my even come from a partner,
never of sophistication. Several component must be considered here, including technical billy. Financial means
resource funding. Several component must be considered here, including technical ability. Again, financial means could be an example. Then we have intent on motivation. This threat could be malicious with the aim to destroy data or to still information or tangible property. Other words. Something you can touch
therefore, the objectives. Here we'll take a look at the use of open source intelligence again. This again is a top of discussion, which encompasses despotic object, explain threat actor types and attributes.
So we look again at the open source. Intelligence basically refers specific information that is available for public consumption.
If any special skill tools or techniques are required to access a piece information, it can't reason be considered open source. So 1/4 to US public law open source intelligence is reduced from public. Available Information is collected is analyzing disseminated in a timely manner
in an appropriate audience, It addresses specific intelligence requirements.
Your security profession used open source intelligence. It used to identify potential witnesses in front of so that they can re mediate before they are exploded by a threat. Actor common and found witnesses cool accident leaks of Since information they may have open ports are secure in their connected devices,
unpatched software leaks or exposed assets as well.
At this point, we have our post assessment question,
and the question is as follows. Blank is an external threat. Who did faces your website or breaks into your computer network. There, politically motivated is a A hacktivist. Be insider. See script kiddies or D competitors?
If you selected au absolutely it because it's a hacktivist.
Let's take a look at some key takeaways from this particular. An objective
a threat Act is another name for hacker or tackle. Who's lightning attack your company. They will all have different attributes.
Ah, script kiddies, a person who does not have the high technical knowledge use a scripting code that he find to make an attack against your organization.
Ah, hacktivists external threat that who, in other words, this individual he or she did face your website or breaks into a computer network there politically motivated
organized crime with for two criminals who target computers, meaning to steal data and then senator competitors, or at the highest bidder on the words just trying to make a profit
advanced. Persistent threat is a threat that tries to steal data from your never, but they are therefore screaming long periods of time.
An insider threat is a disco unemployed. He might have been overlooked, obviously for promotion, and then they relation with the company obviously has went south all the words with South.
Then we have a competitive, which is a threat actor who were trying and still a company trade secret to game. A Market advantage.
The term open source of First Pacific to information that is available for public communication
and our upcoming presentation Working tear on discussion of the main one, which is titled Threats, Attacks and Vulnerabilities by taking a look at the brand new learn objective one point forward just title. Explain penetration testing concepts again, I see you on the very next
Up Next
CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By