9 hours 57 minutes
Welcome to less than 2- three threat actors.
In this lesson, we'll identify common thread actors and differentiate between these types of threat actors.
So to start cybercriminals, organized crime activists, insider threats and nation states are examples of threat actors. We're going to talk about
cybercriminals shown term for anyone who commits crimes involving technology and the internet
crimes include data theft, system compromise and identity theft.
It's important to note
that in the cyber security community and info set community hackers are not deemed bad guys,
its responsibility or job function just like a plumber or a pilot.
if those functions go criminal, they're deemed criminals.
So next time you go to a hacker event, it's not typically for bad people, it's for people who practice the art of hacking,
organized crime. Syndicates. Cybercrime tends to be lower risk, high reward than traditional organized crime. As a result, organized crime is moving to cyberspace
and in fact they're already there
activists are hackers with the cost.
You may have followed popular activist organizations called anonymous
if they deem the group that is
which is anonymous,
finds that an organization has somehow wronged the general population or
represents something that they don't agree with.
They will launch attacks on the systems, whether they take the system's offline or cause damage.
There's two types of insider threats.
There's intentional and unintentional
intentional threats include disgruntled employees or former employees who seek to damage an organization.
Unintentional threats include accidental threats caused by employees,
such as users clicking links in phishing emails.
It's important to make sure you prepare and plan for both
for intentional threats.
from all phases of the employment life cycle
are important to protect against data that could potentially be touched
or access to buy an individual
also having active and passive
systems in place to prevent malware from being executed,
for example, their email,
security systems and also through end user training and awareness.
Nation State actors. Nation State actors are the most sophisticated threat actors. They consist of well organized team backed by government
backed by their government
motivations include espionage destruction. In fact,
typically political motivation and again government backed
our big criterias of some of these
You may have heard about the Sony hack that occurred several years ago.
follow back to North Korea.
Of course they denied involvement. However, by looking at the analysis, you can see that North Korea or actress in North Korea were certainly involved
in this lesson.
The different types of threat actors that exist and how to differentiate them were discussed.
CompTIA Cybersecurity Analyst (CySA+) CS0-002 Practice Test
The CySA+ practice test helps students prepare for the CompTIA CySA+ CS0-002 certification exam. ...
CompTIA Cybersecurity Analyst (CySA+) CS0-002 Lab
The CompTIA CYSA+ lab bundle helps students hone their hands-on skills for the CySA+ (CS0-002) ...
30 CEU/CPE Hours Available