Threat Actors

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
9 hours 57 minutes
Difficulty
Intermediate
CEU/CPE
10
Video Transcription
00:01
Welcome to less than 2- three threat actors.
00:07
In this lesson, we'll identify common thread actors and differentiate between these types of threat actors.
00:15
So to start cybercriminals, organized crime activists, insider threats and nation states are examples of threat actors. We're going to talk about
00:24
cybercriminals shown term for anyone who commits crimes involving technology and the internet
00:29
crimes include data theft, system compromise and identity theft.
00:32
It's important to note
00:34
that in the cyber security community and info set community hackers are not deemed bad guys,
00:42
its responsibility or job function just like a plumber or a pilot.
00:47
However,
00:49
if those functions go criminal, they're deemed criminals.
00:52
So next time you go to a hacker event, it's not typically for bad people, it's for people who practice the art of hacking,
01:00
organized crime. Syndicates. Cybercrime tends to be lower risk, high reward than traditional organized crime. As a result, organized crime is moving to cyberspace
01:10
and in fact they're already there
01:14
activists are hackers with the cost.
01:17
You may have followed popular activist organizations called anonymous
01:21
if they deem the group that is
01:23
which is anonymous,
01:25
finds that an organization has somehow wronged the general population or
01:30
represents something that they don't agree with.
01:33
They will launch attacks on the systems, whether they take the system's offline or cause damage.
01:40
Insider threats.
01:42
There's two types of insider threats.
01:44
There's intentional and unintentional
01:46
intentional threats include disgruntled employees or former employees who seek to damage an organization.
01:51
Unintentional threats include accidental threats caused by employees,
01:55
such as users clicking links in phishing emails.
01:57
It's important to make sure you prepare and plan for both
02:00
for intentional threats.
02:02
Having
02:04
HR policies
02:05
from all phases of the employment life cycle
02:07
are important to protect against data that could potentially be touched
02:13
or access to buy an individual
02:15
also having active and passive
02:19
systems in place to prevent malware from being executed,
02:24
for example, their email,
02:25
through your
02:29
security systems and also through end user training and awareness.
02:35
Mhm.
02:35
Uh huh.
02:36
Nation State actors. Nation State actors are the most sophisticated threat actors. They consist of well organized team backed by government
02:43
backed by their government
02:45
motivations include espionage destruction. In fact,
02:47
typically political motivation and again government backed
02:51
our big criterias of some of these
02:54
nation states.
02:55
You may have heard about the Sony hack that occurred several years ago.
03:00
There was
03:00
ultimately
03:04
follow back to North Korea.
03:07
Of course they denied involvement. However, by looking at the analysis, you can see that North Korea or actress in North Korea were certainly involved
03:19
in this lesson.
03:21
The different types of threat actors that exist and how to differentiate them were discussed.
03:24
Yeah.
Up Next